QID 751078

Date Published: 2021-09-15

QID 751078: SUSE Enterprise Linux Security Update for dovecot23 (SUSE-SU-2021:2890-1)

This update for dovecot23 fixes the following issues: update dovecot to version 2.3.15 (jsc#sle-19970): security issues fixed: - cve-2021-29157: dovecot does not correctly escape kid and azp fields in jwt tokens.
This may be used to supply attacker controlled keys to validate tokens, if attacker has local access. (
Bsc#1187418) local attacker can login as any user and access their emails - cve-2021-33515: on-path attacker could have injected plaintext commands before starttls negotiation that would be executed after starttls finished with the client. (
Bsc#1187419) attacker can potentially steal user credentials and mails * disconnection log messages are now more standardized across services.
they also always now start with "disconnected" prefix.
* dovecot now depends on libsystemd for systemd integration.
* removed support for lua 5.2.
Use version 5.1 or 5.3 instead.
* config: some settings are now marked as "hidden".
Its discouraged to change these settings.
They will no longer be visible in doveconf output, except if they have been changed or if doveconf -s parameter is used.
See for details.
* imap-compress: compression level is now algorithm specific.
See * indexer-worker: convert "indexed" info logs to an event named "indexer_worker_indexing_finished".
See g-finished + add tslv1.3 support to min_protocols.
+ allow configuring ssl_cipher_suites. (
For tlsv1.3+) + acl: add acl_ignore_namespace setting which allows to entirely ignore acls for the listed namespaces.
+ imap: support official rfc8970 preview/snippet syntax.
Old methods of retrieving preview information via imap commands ("snippet and preview with explicit algorithm selection") have been deprecated.
+ imapc: support indexpvt for imapc storage to enable private message flags for cluster wide shared mailboxes.
+ lib-storage: add new events: mail_opened, mail_expunge_requested, mail_expunged, mail_cache_lookup_finished.
See + zlib, imap-compression, fs-compress: support compression levels that the algorithm supports.
Before, we would allow hardcoded value between 1 to 9 and would default to 6.
Now we allow using per-algorithm value range and default to whatever default the algorithm specifies.
- *-login: commands pipelined together with and just after the authenticate command cause these commands to be executed twice.
This applies to all protocols that involve user login, which currently comprises of imap, pop3, submisision and managesieve.
- *-login: processes are supposed to disconnect the oldest non-logged in connection when process_limit was reached.
This didnt actually happen with the default "high-security mode" (with service_count=1) where each connection is handled by a separate process.
- *-login: when login process reaches client/process limits, oldest client connections are disconnected.
If one of these was still doing anvil lookup, this caused a crash.
This could happen only if the login process limits were very low or if the server was overloaded.
- fixed building with link time optimizations (-flto).
- auth: userdb iteration with passwd driver does not always return all users with some nss drivers.
- dsync: shared inbox not synced when "mail_shared_explicit_inbox" was disabled.
If a user has a shared mailbox which is another users inbox, dsync didnt include the mailbox in syncing unless explicit naming is enabled with "mail_shared_explicit_inbox" set to "yes".
- dsync: shared namespaces were not synced with "-n" flag.
- dsync: syncing shared inbox failed if mail_attribute_dict was not set.
V2.3 regression.
V2.3.14 regression.
= null).

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and [...]

Successful exploitation allows attacker to compromise the system.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5.8 severity.
  • Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2890-1 to address this issue and obtain further details.
    Software Advisories
    Advisory ID Software Component Link
    SUSE-SU-2021:2890-1 SUSE Enterprise Linux URL Logo lists.suse.com/pipermail/sle-security-updates/2021-August/009373.html