DEBIAN-CVE-2021-32056

Source
https://security-tracker.debian.org/tracker/CVE-2021-32056
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2021-32056.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2021-32056
Upstream
Published
2021-05-10T14:15:07.577Z
Modified
2025-11-19T01:01:58.385659Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

Cyrus IMAP before 3.2.7, and 3.3.x and 3.4.x before 3.4.1, allows remote authenticated users to bypass intended access restrictions on server annotations and consequently cause replication to stall.

References

Affected packages

Debian:11 / cyrus-imapd

Package

Name
cyrus-imapd
Purl
pkg:deb/debian/cyrus-imapd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.6-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / cyrus-imapd

Package

Name
cyrus-imapd
Purl
pkg:deb/debian/cyrus-imapd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.6-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / cyrus-imapd

Package

Name
cyrus-imapd
Purl
pkg:deb/debian/cyrus-imapd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.6-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / cyrus-imapd

Package

Name
cyrus-imapd
Purl
pkg:deb/debian/cyrus-imapd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.6-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}