Hi all,

we are releasing a CVE patch release 2.3.21.1.

https://dovecot.org/releases/2.3/dovecot-2.3.21.1.tar.gz
https://dovecot.org/releases/2.3/dovecot-2.3.21.1.tar.gz.sig
Binary packages in https://repo.dovecot.org/
Docker images in https://hub.docker.com/r/dovecot/dovecot

Kind regards,
Aki Tuomi
Open-Xchange oy

---

- CVE-2024-23184: A large number of address headers in email resulted
  in excessive CPU usage.
- CVE-2024-23185: Abnormally large email headers are now truncated or
  discarded, with a limit of 10MB on a single header and 50MB for all
  the headers of all the parts of an email.
- oauth2: Dovecot would send client_id and client_secret as POST parameters
  to introspection server. These need to be optionally in Basic auth
  instead as required by OIDC specification.
- oauth2: JWT key type check was too strict.
- oauth2: JWT token audience was not validated against client_id as
  required by OIDC specification.
- oauth2: XOAUTH2 and OAUTHBEARER mechanisms were not giving out
  protocol specific error message on all errors. This broke OIDC discovery.
- oauth2: JWT aud validation was not performed if aud was missing
  from token, but was configured on Dovecot.

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Dovecot-news mailing list -- dovecot-news@dovecot.org
To unsubscribe send an email to dovecot-news-le...@dovecot.org

Reply via email to