UbuntuUpdates.org

Package "dovecot-gssapi"

Name: dovecot-gssapi

Description:

secure POP3/IMAP server - GSSAPI support

Latest version: 1:2.3.7.2-1ubuntu3.6
Release: focal (20.04)
Level: updates
Repository: universe
Head package: dovecot
Homepage: http://dovecot.org/

Links


Download "dovecot-gssapi"


Other versions of "dovecot-gssapi" in Focal

Repository Area Version
base universe 1:2.3.7.2-1ubuntu3
security universe 1:2.3.7.2-1ubuntu3.6

Changelog

Version: 1:2.3.7.2-1ubuntu3.6 2022-07-11 16:07:16 UTC

  dovecot (1:2.3.7.2-1ubuntu3.6) focal-security; urgency=medium

  * SECURITY UPDATE: privilege escalation via multiple passdbs
    - debian/patches/CVE-2022-30550.patch: fix handling passdbs with
      identical driver/args but different mechanisms/username_filter in
      src/auth/auth-request.c, src/auth/auth.c, src/auth/auth.h,
      src/auth/passdb.c, src/auth/passdb.h.
    - CVE-2022-30550

 -- Marc Deslauriers <email address hidden> Thu, 07 Jul 2022 13:17:38 -0400

Source diff to previous version
CVE-2022-30550 Privilege escalation possible in dovecot when imilar master and non-master passdbs are used

Version: 1:2.3.7.2-1ubuntu3.5 2021-10-07 02:06:26 UTC

  dovecot (1:2.3.7.2-1ubuntu3.5) focal; urgency=medium

  * d/p/handle-unbounded-mime.patch: Fix crash during deinit when
    searching mails with non-ending MIME boundaries.
    (LP: #1912118)

 -- Bryce Harrington <email address hidden> Sun, 11 Apr 2021 13:25:41 -0700

Source diff to previous version
1912118 assertion failure in message_part_finish when searching large folder

Version: 1:2.3.7.2-1ubuntu3.4 2021-06-21 15:06:38 UTC

  dovecot (1:2.3.7.2-1ubuntu3.4) focal-security; urgency=medium

  * SECURITY UPDATE: plaintext command injection before STARTTLS
    - debian/patches/CVE-2021-33515.patch: properly handle command queue in
      src/lib-smtp/smtp-server-cmd-starttls.c,
      src/lib-smtp/smtp-server-connection.c.
    - CVE-2021-33515

 -- Marc Deslauriers <email address hidden> Wed, 16 Jun 2021 09:12:21 -0400

Source diff to previous version
CVE-2021-33515 SMTP Submission service STARTTLS injection

Version: 1:2.3.7.2-1ubuntu3.3 2021-01-04 16:06:22 UTC

  dovecot (1:2.3.7.2-1ubuntu3.3) focal-security; urgency=medium

  * SECURITY UPDATE: information disclosure via imap hibernation
    - debian/patches/CVE-2020-24386-1.patch: escape tag when sending it to
      imap-hibernate process in src/imap/imap-client-hibernate.c.
    - debian/patches/CVE-2020-24386-2.patch: add unit test for
      imap-client-hibernate in src/imap/Makefile.am,
      src/imap/imap-client-hibernate.c, src/imap/imap-client.h,
      src/imap/test-imap-client-hibernate.c.
    - CVE-2020-24386
  * SECURITY UPDATE: remote DoS via large number of MIME parts
    - debian/patches/CVE-2020-25275-1.patch: fix assert-crash when
      enforcing MIME part limit in src/lib-mail/message-parser.c,
      src/lib-mail/test-message-parser.c.
    - debian/patches/CVE-2020-25275-2.patch: don't generate invalid
      BODYSTRUCTURE when reaching MIME part limit in
      src/lib-imap/imap-bodystructure.c.
    - CVE-2020-25275

 -- Marc Deslauriers <email address hidden> Mon, 28 Dec 2020 11:04:43 -0500

Source diff to previous version

Version: 1:2.3.7.2-1ubuntu3.2 2020-08-12 15:07:18 UTC

  dovecot (1:2.3.7.2-1ubuntu3.2) focal-security; urgency=medium

  * SECURITY UPDATE: DoS via deeply nested MIME parts
    - debian/patches/CVE-2020-12100/*.patch: backports of upstream patches
      to fix the issue.
    - CVE-2020-12100
  * SECURITY UPDATE: DoS via incorrect NTLM message buffer size
    - debian/patches/CVE-2020-12673/*.patch: check buffer length in
      src/lib-ntlm/ntlm-message.c.
    - CVE-2020-12673
  * SECURITY UPDATE: DoS via zero-length message
    - debian/patches/CVE-2020-12674/*.patch: fail on zero-length buffer in
      src/auth/mech-rpa.c.
    - CVE-2020-12674

 -- Marc Deslauriers <email address hidden> Wed, 05 Aug 2020 10:26:17 -0400




About   -   Send Feedback to @ubuntu_updates