| Name | CVE-2021-3657 |
| Description | A flaw was found in mbsync versions prior to 1.4.4. Due to inadequate handling of extremely large (>=2GiB) IMAP literals, malicious or compromised IMAP servers, and hypothetically even external email senders, could cause several different buffer overflows, which could conceivably be exploited for remote code execution. |
| Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DLA-3066-1 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| isync (PTS) | bullseye | 1.3.0-2.2+deb11u1 | fixed |
| bookworm, sid, trixie | 1.4.4-5 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| isync | source | stretch | 1.2.1-2+deb9u1 | DLA-3066-1 | ||
| isync | source | buster | 1.3.0-2.2~deb10u2 | |||
| isync | source | bullseye | 1.3.0-2.2+deb11u1 | |||
| isync | source | (unstable) | 1.4.4-1 |
https://www.openwall.com/lists/oss-security/2021/12/03/1