Arch Linux Security Advisory ASA-202106-57 ========================================== Severity: Medium Date : 2021-06-22 CVE-ID : CVE-2020-28200 Package : pigeonhole Type : denial of service Remote : Yes Link : https://security.archlinux.org/AVG-2088 Summary ======= The package pigeonhole before version 0.5.15-1 is vulnerable to denial of service. Resolution ========== Upgrade to 0.5.15-1. # pacman -Syu "pigeonhole>=0.5.15-1" The problem has been fixed upstream in version 0.5.15. Workaround ========== Disabling the regex sieve extension avoids the worst problems. lmtp_user_concurrency_limit may also be helpful. Description =========== A security issue has been found in Pigeonhole before version 0.5.15. The Sieve interpreter is not protected against abusive scripts that claim excessive resource usage, especially scripts using massive amounts of regexps. This means an attacker can cause a denial of service of the mail delivery system by using excessive amount of CPU and/or reaching the lmtp/lda process limits. Impact ====== A user could consume an excessive amount of CPU resources through crafted Sieve scripts. References ========== https://dovecot.org/pipermail/dovecot-news/2021-June/000458.html https://dovecot.org/pipermail/dovecot-news/2021-June/000460.html https://github.com/dovecot/pigeonhole/commit/68505e444f91ebd784d419a8c11f1bc3fda3ceab https://security.archlinux.org/CVE-2020-28200