\{'type': 'Security', 'shortCode': 'RL', 'name': 'RLSA-2021:3492', 'synopsis': 'Important: cyrus-imapd security update', 'severity': 'Important', 'topic': 'An update for cyrus-imapd is now available for Rocky Linux 8.\nRocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.', 'description': 'The Cyrus IMAP server provides access to personal mail, system-wide bulletin boards, news-feeds, calendar and contacts through the IMAP, JMAP, NNTP, CalDAV and CardDAV protocols.\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', 'solution': None, 'affectedProducts': ['Rocky Linux 8'], 'fixes': ['1993232'], 'cves': ['Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33582.json:::CVE-2021-33582'], 'references': [], 'publishedAt': '2021-10-01T19:58:07.620507Z', 'rpms': ['cyrus-imapd-3.0.7-20.el8_4.1.aarch64.rpm', 'cyrus-imapd-3.0.7-20.el8_4.1.i686.rpm', 'cyrus-imapd-3.0.7-20.el8_4.1.src.rpm', 'cyrus-imapd-3.0.7-20.el8_4.1.x86_64.rpm', 'cyrus-imapd-debuginfo-3.0.7-20.el8_4.1.aarch64.rpm', 'cyrus-imapd-debuginfo-3.0.7-20.el8_4.1.i686.rpm', 'cyrus-imapd-debuginfo-3.0.7-20.el8_4.1.x86_64.rpm', 'cyrus-imapd-debugsource-3.0.7-20.el8_4.1.aarch64.rpm', 'cyrus-imapd-debugsource-3.0.7-20.el8_4.1.i686.rpm', 'cyrus-imapd-debugsource-3.0.7-20.el8_4.1.x86_64.rpm', 'cyrus-imapd-utils-3.0.7-20.el8_4.1.aarch64.rpm', 'cyrus-imapd-utils-3.0.7-20.el8_4.1.x86_64.rpm', 'cyrus-imapd-utils-debuginfo-3.0.7-20.el8_4.1.aarch64.rpm', 'cyrus-imapd-utils-debuginfo-3.0.7-20.el8_4.1.x86_64.rpm', 'cyrus-imapd-vzic-3.0.7-20.el8_4.1.aarch64.rpm', 'cyrus-imapd-vzic-3.0.7-20.el8_4.1.x86_64.rpm', 'cyrus-imapd-vzic-debuginfo-3.0.7-20.el8_4.1.aarch64.rpm', 'cyrus-imapd-vzic-debuginfo-3.0.7-20.el8_4.1.x86_64.rpm']}\

Rocky Linux: RLSA-2021:3492 cyrus-imapd security update

September 2, 2022
An update for cyrus-imapd is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important

Summary

An update for cyrus-imapd is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


The Cyrus IMAP server provides access to personal mail, system-wide bulletin boards, news-feeds, calendar and contacts through the IMAP, JMAP, NNTP, CalDAV and CardDAV protocols. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

RPMs

cyrus-imapd-3.0.7-20.el8_4.1.aarch64.rpm

cyrus-imapd-3.0.7-20.el8_4.1.i686.rpm

cyrus-imapd-3.0.7-20.el8_4.1.src.rpm

cyrus-imapd-3.0.7-20.el8_4.1.x86_64.rpm

cyrus-imapd-debuginfo-3.0.7-20.el8_4.1.aarch64.rpm

cyrus-imapd-debuginfo-3.0.7-20.el8_4.1.i686.rpm

cyrus-imapd-debuginfo-3.0.7-20.el8_4.1.x86_64.rpm

cyrus-imapd-debugsource-3.0.7-20.el8_4.1.aarch64.rpm

cyrus-imapd-debugsource-3.0.7-20.el8_4.1.i686.rpm

cyrus-imapd-debugsource-3.0.7-20.el8_4.1.x86_64.rpm

cyrus-imapd-utils-3.0.7-20.el8_4.1.aarch64.rpm

cyrus-imapd-utils-3.0.7-20.el8_4.1.x86_64.rpm

cyrus-imapd-utils-debuginfo-3.0.7-20.el8_4.1.aarch64.rpm

cyrus-imapd-utils-debuginfo-3.0.7-20.el8_4.1.x86_64.rpm

cyrus-imapd-vzic-3.0.7-20.el8_4.1.aarch64.rpm

cyrus-imapd-vzic-3.0.7-20.el8_4.1.x86_64.rpm

cyrus-imapd-vzic-debuginfo-3.0.7-20.el8_4.1.aarch64.rpm

cyrus-imapd-vzic-debuginfo-3.0.7-20.el8_4.1.x86_64.rpm

References

No References

CVEs

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33582.json

Severity
Name: RLSA-2021:3492
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=


Related News