cyrus-imapd is vulnerable to privilege escalation. It is possible in component created mailboxes with administrator privileges if the “fileinto” was used, bypassing ACL checks.
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/
access.redhat.com/errata/RHSA-2020:4655
access.redhat.com/security/updates/classification/#moderate
lists.fedoraproject.org/archives/list/[email protected]/message/2DIV4HQ6LG5GPRO4B5Z2NHCZUPBUVVVF/
lists.fedoraproject.org/archives/list/[email protected]/message/6IGOO5UGEBBDPN7B2YXLK7I7L3Y35EBA/
seclists.org/bugtraq/2019/Dec/38
security.gentoo.org/glsa/202006-23
usn.ubuntu.com/4566-1/
www.cyrusimap.org/imap/download/release-notes/2.5/x/2.5.15.html
www.cyrusimap.org/imap/download/release-notes/3.0/x/3.0.13.html
www.debian.org/security/2019/dsa-4590