CVE-2024-34055
Publication date 5 June 2024
Last updated 24 January 2025
Ubuntu priority
Cvss 3 Severity Score
Cyrus IMAP before 3.8.3 and 3.10.x before 3.10.0-rc1 allows authenticated attackers to cause unbounded memory allocation by sending many LITERALs in a single command.
Status
Package | Ubuntu Release | Status |
---|---|---|
cyrus-imapd | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Fixed 3.8.2-1ubuntu0.1~esm1
|
|
22.04 LTS jammy |
Fixed 3.4.3-3ubuntu0.1+esm1
|
|
20.04 LTS focal | Ignored changes too intrusive | |
18.04 LTS bionic | Ignored changes too intrusive | |
cyrus-imapd-2.4 | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
16.04 LTS xenial | Ignored changes too intrusive |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
octagalland
Debian deemed the fix for this vulnerability as too intrusive to backport for versions 3.2 and 3.0
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-7224-1
- Cyrus IMAP Server vulnerabilities
- 22 January 2025