From 97319e6620fa2185613b630e61b623c365b2cfe2 Mon Sep 17 00:00:00 2001 From: Markus Koschany Date: Mon, 20 Jun 2022 09:00:38 +0200 Subject: DLA-3052-1 --- english/lts/security/2022/dla-3052.data | 10 ++++++++++ english/lts/security/2022/dla-3052.wml | 25 +++++++++++++++++++++++++ 2 files changed, 35 insertions(+) create mode 100644 english/lts/security/2022/dla-3052.data create mode 100644 english/lts/security/2022/dla-3052.wml diff --git a/english/lts/security/2022/dla-3052.data b/english/lts/security/2022/dla-3052.data new file mode 100644 index 00000000000..d4df7c7c0f1 --- /dev/null +++ b/english/lts/security/2022/dla-3052.data @@ -0,0 +1,10 @@ +DLA-3052-1 cyrus-imapd +2022-6-20 +CVE-2019-18928 CVE-2021-33582 Bug#993433 +cyrus-imapd +yes +yes +no + +#use wml::debian::security + diff --git a/english/lts/security/2022/dla-3052.wml b/english/lts/security/2022/dla-3052.wml new file mode 100644 index 00000000000..c91a8d0a2f6 --- /dev/null +++ b/english/lts/security/2022/dla-3052.wml @@ -0,0 +1,25 @@ +LTS security update + +

It was discovered that the Cyrus IMAP server was prone to a denial of service +attack via input that is mishandled during hash-table interaction. Furthermore +it allowed privilege escalation because an HTTP request may be interpreted in +the authentication context of an unrelated previous request that arrived over +the same connection.

+ +

For Debian 9 stretch, these problems have been fixed in version +2.5.10-3+deb9u3.

+ +

We recommend that you upgrade your cyrus-imapd packages.

+ +

For the detailed security status of cyrus-imapd please refer to +its security tracker page at: +https://security-tracker.debian.org/tracker/cyrus-imapd

+ +

Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: https://wiki.debian.org/LTS

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2022/dla-3052.data" +# $Id: $ -- cgit v1.2.3