ASA-202106-56 log generated external raw

[ASA-202106-56] dovecot: information disclosure
Arch Linux Security Advisory ASA-202106-56 ========================================== Severity: High Date : 2021-06-22 CVE-ID : CVE-2021-29157 CVE-2021-33515 Package : dovecot Type : information disclosure Remote : Yes Link : Summary ======= The package dovecot before version 2.3.15-1 is vulnerable to information disclosure. Resolution ========== Upgrade to 2.3.15-1. # pacman -Syu "dovecot>=2.3.15-1" The problems have been fixed upstream in version 2.3.15. Workaround ========== CVE-2021-29157 can be mitigated by disabling local JWT validation in oauth2, or using a different dict driver than fs:posix. No known workaround exists for CVE-2021-33515. Description =========== - CVE-2021-29157 (information disclosure) A security issue has been found in Dovecot before version The kid and azp fields in JWT tokens are not correctly escaped. This may be used to supply attacker controlled keys to validate tokens in some configurations. The attack requires an attacker to be able to write files to the local disk. As a result, a local attacker can login as any user and access their emails. - CVE-2021-33515 (information disclosure) A security issue has been found in Dovecot before version An on-path attacker could inject plaintext commands before the STARTTLS negotiation that would be executed after STARTTLS finished with the client. Only the SMTP submission service is affected. As a result, an attacker can potentially steal user credentials and emails. The attacker needs to have sending permissions on the submission server (a valid username and password). Impact ====== A remote authenticated attacker or a local attacker with write access to the disk could disclose user credentials and emails. References ==========