MGASA-2021-0557 - Updated dovecot packages fix security vulnerabilities

Publication date: 19 Dec 2021
URL: https://advisories.mageia.org/MGASA-2021-0557.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2020-28200,
     CVE-2021-29157,
     CVE-2021-33515

Updated dovecot packages fix security vulnerabilities:

The Sieve engine in Dovecot before 2.3.15 allows Uncontrolled Resource
Consumption, as demonstrated by a situation with a complex regular
expression for the regex extension (CVE-2020-28200).

Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access
to the local filesystem can trick OAuth2 authentication into using an HS256
validation key from an attacker-controlled location. This occurs during use
of local JWT validation with the posix fs driver (CVE-2021-29157).

The submission service in Dovecot before 2.3.15 allows STARTTLS command
injection in lib-smtp. Sensitive information can be redirected to an
attacker-controlled address (CVE-2021-33515).

References:
- https://bugs.mageia.org/show_bug.cgi?id=29160
- https://dovecot.org/pipermail/dovecot-news/2021-June/000460.html
- https://dovecot.org/pipermail/dovecot-news/2021-June/000461.html
- https://dovecot.org/pipermail/dovecot-news/2021-June/000462.html
- https://dovecot.org/pipermail/dovecot-news/2021-June/000459.html
- https://dovecot.org/pipermail/dovecot-news/2021-June/000457.html
- https://dovecot.org/pipermail/dovecot-news/2021-October/000465.html
- https://dovecot.org/pipermail/dovecot-news/2021-December/000468.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28200
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29157
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33515

SRPMS:
- 8/core/dovecot-2.3.17.1-1.1.mga8