Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-3814 (GCVE-0-2019-3814)
Vulnerability from cvelistv5
Published
2019-03-27 12:20
Modified
2024-08-04 19:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:19:18.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.dovecot.org/list/dovecot/2019-February/114575.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814" }, { "name": "openSUSE-SU-2019:1220", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html" }, { "name": "GLSA-201904-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201904-19" }, { "name": "FEDORA-2019-9e004decea", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4XLI55NGRDTGMVOPYFCPPFNPA5VKYSSY/" }, { "name": "FEDORA-2019-1b61a528dd", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHFZ5OWRIZGIWZJ5PTNVWWZNLLNH4XYS/" }, { "name": "RHSA-2019:3467", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3467" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "dovecot", "vendor": "dovecot", "versions": [ { "status": "affected", "version": "2.2.36.1" }, { "status": "affected", "version": "2.3.4.1" } ] } ], "descriptions": [ { "lang": "en", "value": "It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-06T00:08:03", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.dovecot.org/list/dovecot/2019-February/114575.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814" }, { "name": "openSUSE-SU-2019:1220", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html" }, { "name": "GLSA-201904-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201904-19" }, { "name": "FEDORA-2019-9e004decea", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4XLI55NGRDTGMVOPYFCPPFNPA5VKYSSY/" }, { "name": "FEDORA-2019-1b61a528dd", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHFZ5OWRIZGIWZJ5PTNVWWZNLLNH4XYS/" }, { "name": "RHSA-2019:3467", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3467" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3814", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "dovecot", "version": { "version_data": [ { "version_value": "2.2.36.1" }, { "version_value": "2.3.4.1" } ] } } ] }, "vendor_name": "dovecot" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.7/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.dovecot.org/list/dovecot/2019-February/114575.html", "refsource": "MISC", "url": "https://www.dovecot.org/list/dovecot/2019-February/114575.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814" }, { "name": "openSUSE-SU-2019:1220", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html" }, { "name": "GLSA-201904-19", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201904-19" }, { "name": "FEDORA-2019-9e004decea", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4XLI55NGRDTGMVOPYFCPPFNPA5VKYSSY/" }, { "name": "FEDORA-2019-1b61a528dd", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHFZ5OWRIZGIWZJ5PTNVWWZNLLNH4XYS/" }, { "name": "RHSA-2019:3467", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3467" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-3814", "datePublished": "2019-03-27T12:20:45", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-08-04T19:19:18.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-3814\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2019-03-27T13:29:01.337\",\"lastModified\":\"2024-11-21T04:42:35.823\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto que Dovecot, en versiones anteriores a la 2.2.36.1 y 2.3.4.1, gestiona de manera incorrecta los certificados del cliente. Un atacante remoto en posesi\u00f3n de un certificado v\u00e1lido con un campo \\\"username\\\" vac\u00edo podr\u00eda emplear este problema para suplantar a otros usuarios.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.3,\"impactScore\":5.8},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:P/I:P/A:N\",\"baseScore\":4.9,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.8,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.0\",\"versionEndExcluding\":\"2.2.36.1\",\"matchCriteriaId\":\"B7EC4FD5-8BCE-4412-B8F6-53F4DD0D6CE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.3.0\",\"versionEndExcluding\":\"2.3.4.1\",\"matchCriteriaId\":\"4C44A57B-1823-40EE-A24F-44144C505859\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C312A0-CD2C-4B9C-B064-6409B25C278F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3467\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4XLI55NGRDTGMVOPYFCPPFNPA5VKYSSY/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHFZ5OWRIZGIWZJ5PTNVWWZNLLNH4XYS/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.gentoo.org/glsa/201904-19\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.dovecot.org/list/dovecot/2019-February/114575.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3467\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4XLI55NGRDTGMVOPYFCPPFNPA5VKYSSY/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHFZ5OWRIZGIWZJ5PTNVWWZNLLNH4XYS/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201904-19\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.dovecot.org/list/dovecot/2019-February/114575.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Vendor Advisory\"]}]}}" } }
opensuse-su-2019:0243-1
Vulnerability from csaf_opensuse
Published
2019-03-23 11:06
Modified
2019-03-23 11:06
Summary
Security update for dovecot23
Notes
Title of the patch
Security update for dovecot23
Description of the patch
This update for dovecot23 fixes the following issues:
dovecot was updated to 2.3.3 release, bringing lots of bugfixes (bsc#1124356).
Also the following security issue was fixed:
- CVE-2019-3814: A vulnerability in Dovecot related to SSL client certificate authentication was fixed (bsc#1123022)
The package changes:
Updated pigeonhole to 0.5.3:
- Fix assertion panic occurring when managesieve service fails to
open INBOX while saving a Sieve script. This was caused by a
lack of cleanup after failure.
- Fix specific messages causing an assert panic with actions that
compose a reply (e.g. vacation). With some rather weird input
from the original message, the header folding algorithm (as
used for composing the References header for the reply) got
confused, causing the panic.
- IMAP FILTER=SIEVE capability: Fix FILTER SIEVE SCRIPT command
parsing. After finishing reading the Sieve script, the command
parsing sometimes didn't continue with the search arguments.
This is a time- critical bug that likely only occurs when the
Sieve script is sent in the next TCP frame.
dovecot23 was updated to 2.3.3:
- doveconf hides more secrets now in the default output.
- ssl_dh setting is no longer enforced at startup. If it's not
set and non-ECC DH key exchange happens, error is logged and
client is disconnected.
- Added log_debug=<filter> setting.
- Added log_core_filter=<log filter> setting.
- quota-clone: Write to dict asynchronously
- --enable-hardening attempts to use retpoline Spectre 2
mitigations
- lmtp proxy: Support source_ip passdb extra field.
- doveadm stats dump: Support more fields and output stddev
by default.
- push-notification: Add SSL support for OX backend.
- NUL bytes in mail headers can cause truncated replies when fetched.
- director: Conflicting host up/down state changes may in some
rare situations ended up in a loop of two directors constantly
overwriting each others' changes.
- director: Fix hang/crash when multiple doveadm commands are
being handled concurrently.
- director: Fix assert-crash if doveadm disconnects too early
- virtual plugin: Some searches used 100% CPU for many seconds
- dsync assert-crashed with acl plugin in some situations. (bsc#1119850)
- mail_attachment_detection_options=add-flags-on-save
assert-crashed with some specific Sieve scripts.
- Mail snippet generation crashed with mails containing invalid
Content-Type:multipart header.
- Log prefix ordering was different for some log lines.
- quota: With noenforcing option current quota usage wasn't
updated.
- auth: Kerberos authentication against Samba assert-crashed.
- stats clients were unnecessarily chatty with the stats server.
- imapc: Fixed various assert-crashes when reconnecting to
server.
- lmtp, submission: Fix potential crash if client disconnects
while handling a command.
- quota: Fixed compiling with glibc-2.26 / support libtirpc.
- fts-solr: Empty search values resulted in 400 Bad Request
errors
- fts-solr: default_ns parameter couldn't be used
- submission server crashed if relay server returned over 7 lines
in a reply (e.g. to EHLO)
dovecot was updated to 2.3.2.1:
- SSL/TLS servers may have crashed during client disconnection
- lmtp: With lmtp_rcpt_check_quota=yes mail deliveries may have
sometimes assert-crashed.
- v2.3.2: 'make check' may have crashed with 32bit systems
dovecot was updated to 2.3.2:
- old-stats plugin: Don't temporarily enable PR_SET_DUMPABLE
while opening /proc/self/io. This may still cause security
problems if the process is ptrace()d at the same time.
Instead, open it while still running as root.
- doveadm: Added mailbox cache decision&remove commands. See
doveadm-mailbox(1) man page for details.
- doveadm: Added rebuild attachments command for rebuilding
$HasAttachment or $HasNoAttachment flags for matching mails.
See doveadm-rebuild(1) man page for details.
- cassandra: Use fallback_consistency on more types of errors
- lmtp proxy: Support outgoing SSL/TLS connections
- lmtp: Add lmtp_rawlog_dir and lmtp_proxy_rawlog_dir settings.
- submission: Add support for rawlog_dir
- submission: Add submission_client_workarounds setting.
- lua auth: Add password_verify() function and additional fields
in auth request.
- doveadm-server: TCP connections are hanging when there is a lot
of network output. This especially caused hangs in
dsync-replication.
- Using multiple type=shared mdbox namespaces crashed
- mail_fsync setting was ignored. It was always set to
'optimized'.
- lua auth: Fix potential crash at deinit
- SSL/TLS servers may have crashed if client disconnected during
handshake.
- SSL/TLS servers: Don't send extraneous certificates to client
when alt certs are used.
- lda, lmtp: Return-Path header without '<' may have
assert-crashed.
- lda, lmtp: Unencoded UTF-8 in email address headers may
assert-crash
- lda: -f parameter didn't allow empty/null/domainless address
- lmtp, submission: Message size limit was hardcoded to 40 MB.
Exceeding it caused the connection to get dropped during
transfer.
- lmtp: Fix potential crash when delivery fails at DATA stage
- lmtp: login_greeting setting was ignored
- Fix to work with OpenSSL v1.0.2f
- systemd unit restrictions were too strict by default
- Fix potential crashes when a lot of log output was produced
- SMTP client may have assert-crashed when sending mail
- IMAP COMPRESS: Send 'end of compression' marker when
disconnecting.
- cassandra: Fix consistency=quorum to work
- dsync: Lock file generation failed if home directory didn't
exist
- Snippet generation for HTML mails didn't ignore &entities
inside blockquotes, producing strange looking snippets.
- imapc: Fix assert-crash if getting disconnected and after
reconnection all mails in the selected mailbox are gone.
- pop3c: Handle unexpected server disconnections without
assert-crash
- fts: Fixes to indexing mails via virtual mailboxes.
- fts: If mails contained NUL characters, the text around it
wasn't indexed.
- Obsolete dovecot.index.cache offsets were sometimes used.
Trying to fetch a field that was just added to cache file may
not have always found it.
pigeonhole was updated to 0.5.2:
- Implement plugin for the a vendor-defined IMAP capability
called 'FILTER=SIEVE'. It adds the ability to manually invoke
Sieve filtering in IMAP. More information can be found in
doc/plugins/imap_filter_sieve.txt.
- The Sieve addess test caused an assertion panic for invalid
addresses with UTF-8 codepoints in the localpart. Fixed by
properly detecting invalid addresses with UTF-8 codepoints in
the localpart and skipping these like other invalid addresses
while iterating addresses for the address test.
- Make the length of the subject header for the vacation response
configurable and enforce the limit in UTF-8 codepoints rather
than bytes. The subject header for a vacation response was
statically truncated to 256 bytes, which is too limited for
multi-byte UTF-8 characters.
- Sieve editheader extension: Fix assertion panic occurring when
it is used to manipulate a message header with a very large
header field.
- Properly abort execution of the sieve_discard script upon
error. Before, the LDA Sieve plugin attempted to execute the
sieve_discard script when an error occurs. This can lead to the
message being lost.
- Fix the interaction between quota and the sieve_discard script.
When quota was used together with a sieve_discard script, the
message delivery did not bounce when the quota was exceeded.
- Fix crash for over quota users
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-243
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dovecot23", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for dovecot23 fixes the following issues:\n\ndovecot was updated to 2.3.3 release, bringing lots of bugfixes (bsc#1124356).\n\nAlso the following security issue was fixed:\n\n- CVE-2019-3814: A vulnerability in Dovecot related to SSL client certificate authentication was fixed (bsc#1123022)\n\nThe package changes:\n\nUpdated pigeonhole to 0.5.3:\n\n- Fix assertion panic occurring when managesieve service fails to\n open INBOX while saving a Sieve script. This was caused by a\n lack of cleanup after failure.\n- Fix specific messages causing an assert panic with actions that\n compose a reply (e.g. vacation). With some rather weird input\n from the original message, the header folding algorithm (as\n used for composing the References header for the reply) got\n confused, causing the panic.\n- IMAP FILTER=SIEVE capability: Fix FILTER SIEVE SCRIPT command\n parsing. After finishing reading the Sieve script, the command\n parsing sometimes didn\u0027t continue with the search arguments.\n This is a time- critical bug that likely only occurs when the\n Sieve script is sent in the next TCP frame.\n\ndovecot23 was updated to 2.3.3:\n\n- doveconf hides more secrets now in the default output.\n- ssl_dh setting is no longer enforced at startup. If it\u0027s not\n set and non-ECC DH key exchange happens, error is logged and\n client is disconnected.\n- Added log_debug=\u003cfilter\u003e setting.\n- Added log_core_filter=\u003clog filter\u003e setting.\n- quota-clone: Write to dict asynchronously\n- --enable-hardening attempts to use retpoline Spectre 2\n mitigations\n- lmtp proxy: Support source_ip passdb extra field.\n- doveadm stats dump: Support more fields and output stddev\n by default.\n- push-notification: Add SSL support for OX backend.\n- NUL bytes in mail headers can cause truncated replies when fetched.\n- director: Conflicting host up/down state changes may in some\n rare situations ended up in a loop of two directors constantly\n overwriting each others\u0027 changes.\n- director: Fix hang/crash when multiple doveadm commands are\n being handled concurrently.\n- director: Fix assert-crash if doveadm disconnects too early\n- virtual plugin: Some searches used 100% CPU for many seconds\n- dsync assert-crashed with acl plugin in some situations. (bsc#1119850)\n- mail_attachment_detection_options=add-flags-on-save\n assert-crashed with some specific Sieve scripts.\n- Mail snippet generation crashed with mails containing invalid\n Content-Type:multipart header.\n- Log prefix ordering was different for some log lines.\n- quota: With noenforcing option current quota usage wasn\u0027t\n updated.\n- auth: Kerberos authentication against Samba assert-crashed.\n- stats clients were unnecessarily chatty with the stats server.\n- imapc: Fixed various assert-crashes when reconnecting to\n server.\n- lmtp, submission: Fix potential crash if client disconnects\n while handling a command.\n- quota: Fixed compiling with glibc-2.26 / support libtirpc.\n- fts-solr: Empty search values resulted in 400 Bad Request\n errors\n- fts-solr: default_ns parameter couldn\u0027t be used\n- submission server crashed if relay server returned over 7 lines\n in a reply (e.g. to EHLO)\n\ndovecot was updated to 2.3.2.1:\n\n- SSL/TLS servers may have crashed during client disconnection\n- lmtp: With lmtp_rcpt_check_quota=yes mail deliveries may have\n sometimes assert-crashed.\n- v2.3.2: \u0027make check\u0027 may have crashed with 32bit systems\n\ndovecot was updated to 2.3.2:\n\n- old-stats plugin: Don\u0027t temporarily enable PR_SET_DUMPABLE\n while opening /proc/self/io. This may still cause security\n problems if the process is ptrace()d at the same time.\n Instead, open it while still running as root.\n- doveadm: Added mailbox cache decision\u0026remove commands. See\n doveadm-mailbox(1) man page for details.\n- doveadm: Added rebuild attachments command for rebuilding\n $HasAttachment or $HasNoAttachment flags for matching mails.\n See doveadm-rebuild(1) man page for details.\n- cassandra: Use fallback_consistency on more types of errors\n- lmtp proxy: Support outgoing SSL/TLS connections\n- lmtp: Add lmtp_rawlog_dir and lmtp_proxy_rawlog_dir settings.\n- submission: Add support for rawlog_dir\n- submission: Add submission_client_workarounds setting.\n- lua auth: Add password_verify() function and additional fields\n in auth request.\n- doveadm-server: TCP connections are hanging when there is a lot\n of network output. This especially caused hangs in\n dsync-replication.\n- Using multiple type=shared mdbox namespaces crashed\n- mail_fsync setting was ignored. It was always set to\n \u0027optimized\u0027.\n- lua auth: Fix potential crash at deinit\n- SSL/TLS servers may have crashed if client disconnected during\n handshake.\n- SSL/TLS servers: Don\u0027t send extraneous certificates to client\n when alt certs are used.\n- lda, lmtp: Return-Path header without \u0027\u003c\u0027 may have\n assert-crashed.\n- lda, lmtp: Unencoded UTF-8 in email address headers may\n assert-crash\n- lda: -f parameter didn\u0027t allow empty/null/domainless address\n- lmtp, submission: Message size limit was hardcoded to 40 MB.\n Exceeding it caused the connection to get dropped during\n transfer.\n- lmtp: Fix potential crash when delivery fails at DATA stage\n- lmtp: login_greeting setting was ignored\n- Fix to work with OpenSSL v1.0.2f\n- systemd unit restrictions were too strict by default\n- Fix potential crashes when a lot of log output was produced\n- SMTP client may have assert-crashed when sending mail\n- IMAP COMPRESS: Send \u0027end of compression\u0027 marker when\n disconnecting.\n- cassandra: Fix consistency=quorum to work\n- dsync: Lock file generation failed if home directory didn\u0027t\n exist\n- Snippet generation for HTML mails didn\u0027t ignore \u0026entities\n inside blockquotes, producing strange looking snippets.\n- imapc: Fix assert-crash if getting disconnected and after\n reconnection all mails in the selected mailbox are gone.\n- pop3c: Handle unexpected server disconnections without\n assert-crash\n- fts: Fixes to indexing mails via virtual mailboxes.\n- fts: If mails contained NUL characters, the text around it\n wasn\u0027t indexed.\n- Obsolete dovecot.index.cache offsets were sometimes used.\n Trying to fetch a field that was just added to cache file may\n not have always found it.\n\npigeonhole was updated to 0.5.2:\n\n- Implement plugin for the a vendor-defined IMAP capability\n called \u0027FILTER=SIEVE\u0027. It adds the ability to manually invoke\n Sieve filtering in IMAP. More information can be found in\n doc/plugins/imap_filter_sieve.txt.\n- The Sieve addess test caused an assertion panic for invalid\n addresses with UTF-8 codepoints in the localpart. Fixed by\n properly detecting invalid addresses with UTF-8 codepoints in\n the localpart and skipping these like other invalid addresses\n while iterating addresses for the address test.\n- Make the length of the subject header for the vacation response\n configurable and enforce the limit in UTF-8 codepoints rather\n than bytes. The subject header for a vacation response was\n statically truncated to 256 bytes, which is too limited for\n multi-byte UTF-8 characters.\n- Sieve editheader extension: Fix assertion panic occurring when\n it is used to manipulate a message header with a very large\n header field.\n- Properly abort execution of the sieve_discard script upon\n error. Before, the LDA Sieve plugin attempted to execute the\n sieve_discard script when an error occurs. This can lead to the\n message being lost.\n- Fix the interaction between quota and the sieve_discard script.\n When quota was used together with a sieve_discard script, the\n message delivery did not bounce when the quota was exceeded.\n- Fix crash for over quota users\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-243", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0243-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:0243-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOAK2WGY4Y6IB27AVCF6VZCKTV263VD4/#QOAK2WGY4Y6IB27AVCF6VZCKTV263VD4" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:0243-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOAK2WGY4Y6IB27AVCF6VZCKTV263VD4/#QOAK2WGY4Y6IB27AVCF6VZCKTV263VD4" }, { "category": "self", "summary": "SUSE Bug 1119850", "url": "https://bugzilla.suse.com/1119850" }, { "category": "self", "summary": "SUSE Bug 1123022", "url": "https://bugzilla.suse.com/1123022" }, { "category": "self", "summary": "SUSE Bug 1124356", "url": "https://bugzilla.suse.com/1124356" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3814 page", "url": "https://www.suse.com/security/cve/CVE-2019-3814/" } ], "title": "Security update for dovecot23", "tracking": { "current_release_date": "2019-03-23T11:06:39Z", "generator": { "date": "2019-03-23T11:06:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:0243-1", "initial_release_date": "2019-03-23T11:06:39Z", "revision_history": [ { "date": "2019-03-23T11:06:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dovecot23-2.3.3-lp150.3.3.1.x86_64", "product": { "name": "dovecot23-2.3.3-lp150.3.3.1.x86_64", "product_id": "dovecot23-2.3.3-lp150.3.3.1.x86_64" } }, { "category": "product_version", "name": "dovecot23-backend-mysql-2.3.3-lp150.3.3.1.x86_64", "product": { "name": "dovecot23-backend-mysql-2.3.3-lp150.3.3.1.x86_64", "product_id": "dovecot23-backend-mysql-2.3.3-lp150.3.3.1.x86_64" } }, { "category": "product_version", "name": "dovecot23-backend-pgsql-2.3.3-lp150.3.3.1.x86_64", "product": { "name": "dovecot23-backend-pgsql-2.3.3-lp150.3.3.1.x86_64", "product_id": "dovecot23-backend-pgsql-2.3.3-lp150.3.3.1.x86_64" } }, { "category": "product_version", "name": "dovecot23-backend-sqlite-2.3.3-lp150.3.3.1.x86_64", "product": { "name": "dovecot23-backend-sqlite-2.3.3-lp150.3.3.1.x86_64", "product_id": "dovecot23-backend-sqlite-2.3.3-lp150.3.3.1.x86_64" } }, { "category": "product_version", "name": "dovecot23-devel-2.3.3-lp150.3.3.1.x86_64", "product": { "name": "dovecot23-devel-2.3.3-lp150.3.3.1.x86_64", "product_id": "dovecot23-devel-2.3.3-lp150.3.3.1.x86_64" } }, { "category": "product_version", "name": "dovecot23-fts-2.3.3-lp150.3.3.1.x86_64", "product": { "name": "dovecot23-fts-2.3.3-lp150.3.3.1.x86_64", "product_id": "dovecot23-fts-2.3.3-lp150.3.3.1.x86_64" } }, { "category": "product_version", "name": "dovecot23-fts-lucene-2.3.3-lp150.3.3.1.x86_64", "product": { "name": "dovecot23-fts-lucene-2.3.3-lp150.3.3.1.x86_64", "product_id": "dovecot23-fts-lucene-2.3.3-lp150.3.3.1.x86_64" } }, { "category": "product_version", "name": "dovecot23-fts-solr-2.3.3-lp150.3.3.1.x86_64", "product": { "name": "dovecot23-fts-solr-2.3.3-lp150.3.3.1.x86_64", "product_id": "dovecot23-fts-solr-2.3.3-lp150.3.3.1.x86_64" } }, { "category": "product_version", "name": "dovecot23-fts-squat-2.3.3-lp150.3.3.1.x86_64", "product": { "name": "dovecot23-fts-squat-2.3.3-lp150.3.3.1.x86_64", "product_id": "dovecot23-fts-squat-2.3.3-lp150.3.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dovecot23-2.3.3-lp150.3.3.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:dovecot23-2.3.3-lp150.3.3.1.x86_64" }, "product_reference": "dovecot23-2.3.3-lp150.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-mysql-2.3.3-lp150.3.3.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:dovecot23-backend-mysql-2.3.3-lp150.3.3.1.x86_64" }, "product_reference": "dovecot23-backend-mysql-2.3.3-lp150.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-pgsql-2.3.3-lp150.3.3.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:dovecot23-backend-pgsql-2.3.3-lp150.3.3.1.x86_64" }, "product_reference": "dovecot23-backend-pgsql-2.3.3-lp150.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-sqlite-2.3.3-lp150.3.3.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:dovecot23-backend-sqlite-2.3.3-lp150.3.3.1.x86_64" }, "product_reference": "dovecot23-backend-sqlite-2.3.3-lp150.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-devel-2.3.3-lp150.3.3.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:dovecot23-devel-2.3.3-lp150.3.3.1.x86_64" }, "product_reference": "dovecot23-devel-2.3.3-lp150.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-2.3.3-lp150.3.3.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:dovecot23-fts-2.3.3-lp150.3.3.1.x86_64" }, "product_reference": "dovecot23-fts-2.3.3-lp150.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-lucene-2.3.3-lp150.3.3.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:dovecot23-fts-lucene-2.3.3-lp150.3.3.1.x86_64" }, "product_reference": "dovecot23-fts-lucene-2.3.3-lp150.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-solr-2.3.3-lp150.3.3.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:dovecot23-fts-solr-2.3.3-lp150.3.3.1.x86_64" }, "product_reference": "dovecot23-fts-solr-2.3.3-lp150.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-squat-2.3.3-lp150.3.3.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:dovecot23-fts-squat-2.3.3-lp150.3.3.1.x86_64" }, "product_reference": "dovecot23-fts-squat-2.3.3-lp150.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3814" } ], "notes": [ { "category": "general", "text": "It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:dovecot23-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-backend-mysql-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-backend-pgsql-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-backend-sqlite-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-devel-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-fts-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-fts-lucene-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-fts-solr-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-fts-squat-2.3.3-lp150.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3814", "url": "https://www.suse.com/security/cve/CVE-2019-3814" }, { "category": "external", "summary": "SUSE Bug 1123022 for CVE-2019-3814", "url": "https://bugzilla.suse.com/1123022" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:dovecot23-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-backend-mysql-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-backend-pgsql-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-backend-sqlite-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-devel-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-fts-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-fts-lucene-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-fts-solr-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-fts-squat-2.3.3-lp150.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:dovecot23-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-backend-mysql-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-backend-pgsql-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-backend-sqlite-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-devel-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-fts-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-fts-lucene-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-fts-solr-2.3.3-lp150.3.3.1.x86_64", "openSUSE Leap 15.0:dovecot23-fts-squat-2.3.3-lp150.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T11:06:39Z", "details": "important" } ], "title": "CVE-2019-3814" } ] }
opensuse-su-2025:14715-1
Vulnerability from csaf_opensuse
Published
2025-01-30 00:00
Modified
2025-01-30 00:00
Summary
dovecot24-2.4.0-1.1 on GA media
Notes
Title of the patch
dovecot24-2.4.0-1.1 on GA media
Description of the patch
These are all security issues fixed in the dovecot24-2.4.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-14715
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "dovecot24-2.4.0-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the dovecot24-2.4.0-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-14715", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14715-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:14715-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZSDCZ5LA6IHY7KXVSL6ULAJVP6OFT2M/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:14715-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZSDCZ5LA6IHY7KXVSL6ULAJVP6OFT2M/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14461 page", "url": "https://www.suse.com/security/cve/CVE-2017-14461/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15130 page", "url": "https://www.suse.com/security/cve/CVE-2017-15130/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15132 page", "url": "https://www.suse.com/security/cve/CVE-2017-15132/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10691 page", "url": "https://www.suse.com/security/cve/CVE-2019-10691/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11494 page", "url": "https://www.suse.com/security/cve/CVE-2019-11494/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11499 page", "url": "https://www.suse.com/security/cve/CVE-2019-11499/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11500 page", "url": "https://www.suse.com/security/cve/CVE-2019-11500/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19722 page", "url": "https://www.suse.com/security/cve/CVE-2019-19722/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3814 page", "url": "https://www.suse.com/security/cve/CVE-2019-3814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7524 page", "url": "https://www.suse.com/security/cve/CVE-2019-7524/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10957 page", "url": "https://www.suse.com/security/cve/CVE-2020-10957/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10958 page", "url": "https://www.suse.com/security/cve/CVE-2020-10958/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10967 page", "url": "https://www.suse.com/security/cve/CVE-2020-10967/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12100 page", "url": "https://www.suse.com/security/cve/CVE-2020-12100/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12673 page", "url": "https://www.suse.com/security/cve/CVE-2020-12673/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12674 page", "url": "https://www.suse.com/security/cve/CVE-2020-12674/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24386 page", "url": "https://www.suse.com/security/cve/CVE-2020-24386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28200 page", "url": "https://www.suse.com/security/cve/CVE-2020-28200/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-7046 page", "url": "https://www.suse.com/security/cve/CVE-2020-7046/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-7957 page", "url": "https://www.suse.com/security/cve/CVE-2020-7957/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-29157 page", "url": "https://www.suse.com/security/cve/CVE-2021-29157/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33515 page", "url": "https://www.suse.com/security/cve/CVE-2021-33515/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23184 page", "url": "https://www.suse.com/security/cve/CVE-2024-23184/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-23185 page", "url": "https://www.suse.com/security/cve/CVE-2024-23185/" } ], "title": "dovecot24-2.4.0-1.1 on GA media", "tracking": { "current_release_date": "2025-01-30T00:00:00Z", "generator": { "date": "2025-01-30T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:14715-1", "initial_release_date": "2025-01-30T00:00:00Z", "revision_history": [ { "date": "2025-01-30T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dovecot24-2.4.0-1.1.aarch64", "product": { "name": "dovecot24-2.4.0-1.1.aarch64", "product_id": "dovecot24-2.4.0-1.1.aarch64" } }, { "category": "product_version", "name": "dovecot24-backend-mysql-2.4.0-1.1.aarch64", "product": { "name": "dovecot24-backend-mysql-2.4.0-1.1.aarch64", "product_id": "dovecot24-backend-mysql-2.4.0-1.1.aarch64" } }, { "category": "product_version", "name": "dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "product": { "name": "dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "product_id": "dovecot24-backend-pgsql-2.4.0-1.1.aarch64" } }, { "category": "product_version", "name": "dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "product": { "name": "dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "product_id": "dovecot24-backend-sqlite-2.4.0-1.1.aarch64" } }, { "category": "product_version", "name": "dovecot24-devel-2.4.0-1.1.aarch64", "product": { "name": "dovecot24-devel-2.4.0-1.1.aarch64", "product_id": "dovecot24-devel-2.4.0-1.1.aarch64" } }, { "category": "product_version", "name": "dovecot24-fts-2.4.0-1.1.aarch64", "product": { "name": "dovecot24-fts-2.4.0-1.1.aarch64", "product_id": "dovecot24-fts-2.4.0-1.1.aarch64" } }, { "category": "product_version", "name": "dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "product": { "name": "dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "product_id": "dovecot24-fts-flatcurve-2.4.0-1.1.aarch64" } }, { "category": "product_version", "name": "dovecot24-fts-solr-2.4.0-1.1.aarch64", "product": { "name": "dovecot24-fts-solr-2.4.0-1.1.aarch64", "product_id": "dovecot24-fts-solr-2.4.0-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dovecot24-2.4.0-1.1.ppc64le", "product": { "name": "dovecot24-2.4.0-1.1.ppc64le", "product_id": "dovecot24-2.4.0-1.1.ppc64le" } }, { "category": "product_version", "name": "dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "product": { "name": "dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "product_id": "dovecot24-backend-mysql-2.4.0-1.1.ppc64le" } }, { "category": "product_version", "name": "dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "product": { "name": "dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "product_id": "dovecot24-backend-pgsql-2.4.0-1.1.ppc64le" } }, { "category": "product_version", "name": "dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "product": { "name": "dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "product_id": "dovecot24-backend-sqlite-2.4.0-1.1.ppc64le" } }, { "category": "product_version", "name": "dovecot24-devel-2.4.0-1.1.ppc64le", "product": { "name": "dovecot24-devel-2.4.0-1.1.ppc64le", "product_id": "dovecot24-devel-2.4.0-1.1.ppc64le" } }, { "category": "product_version", "name": "dovecot24-fts-2.4.0-1.1.ppc64le", "product": { "name": "dovecot24-fts-2.4.0-1.1.ppc64le", "product_id": "dovecot24-fts-2.4.0-1.1.ppc64le" } }, { "category": "product_version", "name": "dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "product": { "name": "dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "product_id": "dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le" } }, { "category": "product_version", "name": "dovecot24-fts-solr-2.4.0-1.1.ppc64le", "product": { "name": "dovecot24-fts-solr-2.4.0-1.1.ppc64le", "product_id": "dovecot24-fts-solr-2.4.0-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dovecot24-2.4.0-1.1.s390x", "product": { "name": "dovecot24-2.4.0-1.1.s390x", "product_id": "dovecot24-2.4.0-1.1.s390x" } }, { "category": "product_version", "name": "dovecot24-backend-mysql-2.4.0-1.1.s390x", "product": { "name": "dovecot24-backend-mysql-2.4.0-1.1.s390x", "product_id": "dovecot24-backend-mysql-2.4.0-1.1.s390x" } }, { "category": "product_version", "name": "dovecot24-backend-pgsql-2.4.0-1.1.s390x", "product": { "name": "dovecot24-backend-pgsql-2.4.0-1.1.s390x", "product_id": "dovecot24-backend-pgsql-2.4.0-1.1.s390x" } }, { "category": "product_version", "name": "dovecot24-backend-sqlite-2.4.0-1.1.s390x", "product": { "name": "dovecot24-backend-sqlite-2.4.0-1.1.s390x", "product_id": "dovecot24-backend-sqlite-2.4.0-1.1.s390x" } }, { "category": "product_version", "name": "dovecot24-devel-2.4.0-1.1.s390x", "product": { "name": "dovecot24-devel-2.4.0-1.1.s390x", "product_id": "dovecot24-devel-2.4.0-1.1.s390x" } }, { "category": "product_version", "name": "dovecot24-fts-2.4.0-1.1.s390x", "product": { "name": "dovecot24-fts-2.4.0-1.1.s390x", "product_id": "dovecot24-fts-2.4.0-1.1.s390x" } }, { "category": "product_version", "name": "dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "product": { "name": "dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "product_id": "dovecot24-fts-flatcurve-2.4.0-1.1.s390x" } }, { "category": "product_version", "name": "dovecot24-fts-solr-2.4.0-1.1.s390x", "product": { "name": "dovecot24-fts-solr-2.4.0-1.1.s390x", "product_id": "dovecot24-fts-solr-2.4.0-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dovecot24-2.4.0-1.1.x86_64", "product": { "name": "dovecot24-2.4.0-1.1.x86_64", "product_id": "dovecot24-2.4.0-1.1.x86_64" } }, { "category": "product_version", "name": "dovecot24-backend-mysql-2.4.0-1.1.x86_64", "product": { "name": "dovecot24-backend-mysql-2.4.0-1.1.x86_64", "product_id": "dovecot24-backend-mysql-2.4.0-1.1.x86_64" } }, { "category": "product_version", "name": "dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "product": { "name": "dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "product_id": "dovecot24-backend-pgsql-2.4.0-1.1.x86_64" } }, { "category": "product_version", "name": "dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "product": { "name": "dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "product_id": "dovecot24-backend-sqlite-2.4.0-1.1.x86_64" } }, { "category": "product_version", "name": "dovecot24-devel-2.4.0-1.1.x86_64", "product": { "name": "dovecot24-devel-2.4.0-1.1.x86_64", "product_id": "dovecot24-devel-2.4.0-1.1.x86_64" } }, { "category": "product_version", "name": "dovecot24-fts-2.4.0-1.1.x86_64", "product": { "name": "dovecot24-fts-2.4.0-1.1.x86_64", "product_id": "dovecot24-fts-2.4.0-1.1.x86_64" } }, { "category": "product_version", "name": "dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "product": { "name": "dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "product_id": "dovecot24-fts-flatcurve-2.4.0-1.1.x86_64" } }, { "category": "product_version", "name": "dovecot24-fts-solr-2.4.0-1.1.x86_64", "product": { "name": "dovecot24-fts-solr-2.4.0-1.1.x86_64", "product_id": "dovecot24-fts-solr-2.4.0-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dovecot24-2.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64" }, "product_reference": "dovecot24-2.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-2.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le" }, "product_reference": "dovecot24-2.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-2.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x" }, "product_reference": "dovecot24-2.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-2.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64" }, "product_reference": "dovecot24-2.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-backend-mysql-2.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64" }, "product_reference": "dovecot24-backend-mysql-2.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-backend-mysql-2.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le" }, "product_reference": "dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-backend-mysql-2.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x" }, "product_reference": "dovecot24-backend-mysql-2.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-backend-mysql-2.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64" }, "product_reference": "dovecot24-backend-mysql-2.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-backend-pgsql-2.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64" }, "product_reference": "dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-backend-pgsql-2.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le" }, "product_reference": "dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-backend-pgsql-2.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x" }, "product_reference": "dovecot24-backend-pgsql-2.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-backend-pgsql-2.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64" }, "product_reference": "dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-backend-sqlite-2.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64" }, "product_reference": "dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-backend-sqlite-2.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le" }, "product_reference": "dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-backend-sqlite-2.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x" }, "product_reference": "dovecot24-backend-sqlite-2.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-backend-sqlite-2.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64" }, "product_reference": "dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-devel-2.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64" }, "product_reference": "dovecot24-devel-2.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-devel-2.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le" }, "product_reference": "dovecot24-devel-2.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-devel-2.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x" }, "product_reference": "dovecot24-devel-2.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-devel-2.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64" }, "product_reference": "dovecot24-devel-2.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-fts-2.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64" }, "product_reference": "dovecot24-fts-2.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-fts-2.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le" }, "product_reference": "dovecot24-fts-2.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-fts-2.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x" }, "product_reference": "dovecot24-fts-2.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-fts-2.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64" }, "product_reference": "dovecot24-fts-2.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-fts-flatcurve-2.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64" }, "product_reference": "dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le" }, "product_reference": "dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-fts-flatcurve-2.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x" }, "product_reference": "dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-fts-flatcurve-2.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64" }, "product_reference": "dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-fts-solr-2.4.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64" }, "product_reference": "dovecot24-fts-solr-2.4.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-fts-solr-2.4.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le" }, "product_reference": "dovecot24-fts-solr-2.4.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-fts-solr-2.4.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x" }, "product_reference": "dovecot24-fts-solr-2.4.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot24-fts-solr-2.4.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" }, "product_reference": "dovecot24-fts-solr-2.4.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-14461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14461" } ], "notes": [ { "category": "general", "text": "A specially crafted email delivered over SMTP and passed on to Dovecot by MTA can trigger an out of bounds read resulting in potential sensitive information disclosure and denial of service. In order to trigger this vulnerability, an attacker needs to send a specially crafted email message to the server.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14461", "url": "https://www.suse.com/security/cve/CVE-2017-14461" }, { "category": "external", "summary": "SUSE Bug 1082826 for CVE-2017-14461", "url": "https://bugzilla.suse.com/1082826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "important" } ], "title": "CVE-2017-14461" }, { "cve": "CVE-2017-15130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15130" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15130", "url": "https://www.suse.com/security/cve/CVE-2017-15130" }, { "category": "external", "summary": "SUSE Bug 1082828 for CVE-2017-15130", "url": "https://bugzilla.suse.com/1082828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15130" }, { "cve": "CVE-2017-15132", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15132" } ], "notes": [ { "category": "general", "text": "A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot\u0027s auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15132", "url": "https://www.suse.com/security/cve/CVE-2017-15132" }, { "category": "external", "summary": "SUSE Bug 1075608 for CVE-2017-15132", "url": "https://bugzilla.suse.com/1075608" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15132" }, { "cve": "CVE-2019-10691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10691" } ], "notes": [ { "category": "general", "text": "The JSON encoder in Dovecot before 2.3.5.2 allows attackers to repeatedly crash the authentication service by attempting to authenticate with an invalid UTF-8 sequence as the username.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10691", "url": "https://www.suse.com/security/cve/CVE-2019-10691" }, { "category": "external", "summary": "SUSE Bug 1132501 for CVE-2019-10691", "url": "https://bugzilla.suse.com/1132501" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-10691" }, { "cve": "CVE-2019-11494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11494" } ], "notes": [ { "category": "general", "text": "In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login service crashes when the client disconnects prematurely during the AUTH command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11494", "url": "https://www.suse.com/security/cve/CVE-2019-11494" }, { "category": "external", "summary": "SUSE Bug 1133624 for CVE-2019-11494", "url": "https://bugzilla.suse.com/1133624" }, { "category": "external", "summary": "SUSE Bug 1133625 for CVE-2019-11494", "url": "https://bugzilla.suse.com/1133625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11494" }, { "cve": "CVE-2019-11499", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11499" } ], "notes": [ { "category": "general", "text": "In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login component crashes if AUTH PLAIN is attempted over a TLS secured channel with an unacceptable authentication message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11499", "url": "https://www.suse.com/security/cve/CVE-2019-11499" }, { "category": "external", "summary": "SUSE Bug 1133624 for CVE-2019-11499", "url": "https://bugzilla.suse.com/1133624" }, { "category": "external", "summary": "SUSE Bug 1133625 for CVE-2019-11499", "url": "https://bugzilla.suse.com/1133625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11499" }, { "cve": "CVE-2019-11500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11500" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because \u0027\\0\u0027 characters are mishandled, and can lead to out-of-bounds writes and remote code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11500", "url": "https://www.suse.com/security/cve/CVE-2019-11500" }, { "category": "external", "summary": "SUSE Bug 1145559 for CVE-2019-11500", "url": "https://bugzilla.suse.com/1145559" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11500" }, { "cve": "CVE-2019-19722", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19722" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.3.9.2, an attacker can crash a push-notification driver with a crafted email when push notifications are used, because of a NULL Pointer Dereference. The email must use a group address as either the sender or the recipient.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19722", "url": "https://www.suse.com/security/cve/CVE-2019-19722" }, { "category": "external", "summary": "SUSE Bug 1159090 for CVE-2019-19722", "url": "https://bugzilla.suse.com/1159090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19722" }, { "cve": "CVE-2019-3814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3814" } ], "notes": [ { "category": "general", "text": "It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3814", "url": "https://www.suse.com/security/cve/CVE-2019-3814" }, { "category": "external", "summary": "SUSE Bug 1123022 for CVE-2019-3814", "url": "https://bugzilla.suse.com/1123022" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "important" } ], "title": "CVE-2019-3814" }, { "cve": "CVE-2019-7524", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7524" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.2.36.3 and 2.3.x before 2.3.5.1, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7524", "url": "https://www.suse.com/security/cve/CVE-2019-7524" }, { "category": "external", "summary": "SUSE Bug 1130116 for CVE-2019-7524", "url": "https://bugzilla.suse.com/1130116" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7524" }, { "cve": "CVE-2020-10957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10957" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.3.10.1, unauthenticated sending of malformed parameters to a NOOP command causes a NULL Pointer Dereference and crash in submission-login, submission, or lmtp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10957", "url": "https://www.suse.com/security/cve/CVE-2020-10957" }, { "category": "external", "summary": "SUSE Bug 1171457 for CVE-2020-10957", "url": "https://bugzilla.suse.com/1171457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "important" } ], "title": "CVE-2020-10957" }, { "cve": "CVE-2020-10958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10958" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.3.10.1, a crafted SMTP/LMTP message triggers an unauthenticated use-after-free bug in submission-login, submission, or lmtp, and can lead to a crash under circumstances involving many newlines after a command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10958", "url": "https://www.suse.com/security/cve/CVE-2020-10958" }, { "category": "external", "summary": "SUSE Bug 1171458 for CVE-2020-10958", "url": "https://bugzilla.suse.com/1171458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10958" }, { "cve": "CVE-2020-10967", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10967" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.3.10.1, remote unauthenticated attackers can crash the lmtp or submission process by sending mail with an empty localpart.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10967", "url": "https://www.suse.com/security/cve/CVE-2020-10967" }, { "category": "external", "summary": "SUSE Bug 1171456 for CVE-2020-10967", "url": "https://bugzilla.suse.com/1171456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10967" }, { "cve": "CVE-2020-12100", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12100" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.3.11.3, uncontrolled recursion in submission, lmtp, and lda allows remote attackers to cause a denial of service (resource consumption) via a crafted e-mail message with deeply nested MIME parts.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12100", "url": "https://www.suse.com/security/cve/CVE-2020-12100" }, { "category": "external", "summary": "SUSE Bug 1174920 for CVE-2020-12100", "url": "https://bugzilla.suse.com/1174920" }, { "category": "external", "summary": "SUSE Bug 1180406 for CVE-2020-12100", "url": "https://bugzilla.suse.com/1180406" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12100" }, { "cve": "CVE-2020-12673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12673" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12673", "url": "https://www.suse.com/security/cve/CVE-2020-12673" }, { "category": "external", "summary": "SUSE Bug 1174920 for CVE-2020-12673", "url": "https://bugzilla.suse.com/1174920" }, { "category": "external", "summary": "SUSE Bug 1174922 for CVE-2020-12673", "url": "https://bugzilla.suse.com/1174922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12673" }, { "cve": "CVE-2020-12674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12674" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12674", "url": "https://www.suse.com/security/cve/CVE-2020-12674" }, { "category": "external", "summary": "SUSE Bug 1174920 for CVE-2020-12674", "url": "https://bugzilla.suse.com/1174920" }, { "category": "external", "summary": "SUSE Bug 1174923 for CVE-2020-12674", "url": "https://bugzilla.suse.com/1174923" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12674" }, { "cve": "CVE-2020-24386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24386" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Dovecot before 2.3.13. By using IMAP IDLE, an authenticated attacker can trigger unhibernation via attacker-controlled parameters, leading to access to other users\u0027 email messages (and path disclosure).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24386", "url": "https://www.suse.com/security/cve/CVE-2020-24386" }, { "category": "external", "summary": "SUSE Bug 1180405 for CVE-2020-24386", "url": "https://bugzilla.suse.com/1180405" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "important" } ], "title": "CVE-2020-24386" }, { "cve": "CVE-2020-28200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28200" } ], "notes": [ { "category": "general", "text": "The Sieve engine in Dovecot before 2.3.15 allows Uncontrolled Resource Consumption, as demonstrated by a situation with a complex regular expression for the regex extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28200", "url": "https://www.suse.com/security/cve/CVE-2020-28200" }, { "category": "external", "summary": "SUSE Bug 1187420 for CVE-2020-28200", "url": "https://bugzilla.suse.com/1187420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-28200" }, { "cve": "CVE-2020-7046", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-7046" } ], "notes": [ { "category": "general", "text": "lib-smtp in submission-login and lmtp in Dovecot 2.3.9 before 2.3.9.3 mishandles truncated UTF-8 data in command parameters, as demonstrated by the unauthenticated triggering of a submission-login infinite loop.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-7046", "url": "https://www.suse.com/security/cve/CVE-2020-7046" }, { "category": "external", "summary": "SUSE Bug 1162773 for CVE-2020-7046", "url": "https://bugzilla.suse.com/1162773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "important" } ], "title": "CVE-2020-7046" }, { "cve": "CVE-2020-7957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-7957" } ], "notes": [ { "category": "general", "text": "The IMAP and LMTP components in Dovecot 2.3.9 before 2.3.9.3 mishandle snippet generation when many characters must be read to compute the snippet and a trailing \u003e character exists. This causes a denial of service in which the recipient cannot read all of their messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-7957", "url": "https://www.suse.com/security/cve/CVE-2020-7957" }, { "category": "external", "summary": "SUSE Bug 1162773 for CVE-2020-7957", "url": "https://bugzilla.suse.com/1162773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "important" } ], "title": "CVE-2020-7957" }, { "cve": "CVE-2021-29157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-29157" } ], "notes": [ { "category": "general", "text": "Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access to the local filesystem can trick OAuth2 authentication into using an HS256 validation key from an attacker-controlled location. This occurs during use of local JWT validation with the posix fs driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-29157", "url": "https://www.suse.com/security/cve/CVE-2021-29157" }, { "category": "external", "summary": "SUSE Bug 1187418 for CVE-2021-29157", "url": "https://bugzilla.suse.com/1187418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-29157" }, { "cve": "CVE-2021-33515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33515" } ], "notes": [ { "category": "general", "text": "The submission service in Dovecot before 2.3.15 allows STARTTLS command injection in lib-smtp. Sensitive information can be redirected to an attacker-controlled address.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33515", "url": "https://www.suse.com/security/cve/CVE-2021-33515" }, { "category": "external", "summary": "SUSE Bug 1187419 for CVE-2021-33515", "url": "https://bugzilla.suse.com/1187419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-33515" }, { "cve": "CVE-2024-23184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23184" } ], "notes": [ { "category": "general", "text": "Having a large number of address headers (From, To, Cc, Bcc, etc.) becomes excessively CPU intensive. With 100k header lines CPU usage is already 12 seconds, and in a production environment we observed 500k header lines taking 18 minutes to parse. Since this can be triggered by external actors sending emails to a victim, this is a security issue. An external attacker can send specially crafted messages that consume target system resources and cause outage. One can implement restrictions on address headers on MTA component preceding Dovecot. No publicly available exploits are known.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23184", "url": "https://www.suse.com/security/cve/CVE-2024-23184" }, { "category": "external", "summary": "SUSE Bug 1229184 for CVE-2024-23184", "url": "https://bugzilla.suse.com/1229184" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-23184" }, { "cve": "CVE-2024-23185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-23185" } ], "notes": [ { "category": "general", "text": "Very large headers can cause resource exhaustion when parsing message. The message-parser normally reads reasonably sized chunks of the message. However, when it feeds them to message-header-parser, it starts building up \"full_value\" buffer out of the smaller chunks. The full_value buffer has no size limit, so large headers can cause large memory usage. It doesn\u0027t matter whether it\u0027s a single long header line, or a single header split into multiple lines. This bug exists in all Dovecot versions. Incoming mails typically have some size limits set by MTA, so even largest possible header size may still fit into Dovecot\u0027s vsz_limit. So attackers probably can\u0027t DoS a victim user this way. A user could APPEND larger mails though, allowing them to DoS themselves (although maybe cause some memory issues for the backend in general). One can implement restrictions on headers on MTA component preceding Dovecot. No publicly available exploits are known.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-23185", "url": "https://www.suse.com/security/cve/CVE-2024-23185" }, { "category": "external", "summary": "SUSE Bug 1229183 for CVE-2024-23185", "url": "https://bugzilla.suse.com/1229183" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1.x86_64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.aarch64", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.ppc64le", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.s390x", "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-23185" } ] }
opensuse-su-2024:10726-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
dovecot23-2.3.16-1.6 on GA media
Notes
Title of the patch
dovecot23-2.3.16-1.6 on GA media
Description of the patch
These are all security issues fixed in the dovecot23-2.3.16-1.6 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10726
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "dovecot23-2.3.16-1.6 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the dovecot23-2.3.16-1.6 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10726", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10726-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14461 page", "url": "https://www.suse.com/security/cve/CVE-2017-14461/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15130 page", "url": "https://www.suse.com/security/cve/CVE-2017-15130/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15132 page", "url": "https://www.suse.com/security/cve/CVE-2017-15132/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10691 page", "url": "https://www.suse.com/security/cve/CVE-2019-10691/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11494 page", "url": "https://www.suse.com/security/cve/CVE-2019-11494/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11499 page", "url": "https://www.suse.com/security/cve/CVE-2019-11499/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11500 page", "url": "https://www.suse.com/security/cve/CVE-2019-11500/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19722 page", "url": "https://www.suse.com/security/cve/CVE-2019-19722/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3814 page", "url": "https://www.suse.com/security/cve/CVE-2019-3814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7524 page", "url": "https://www.suse.com/security/cve/CVE-2019-7524/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10957 page", "url": "https://www.suse.com/security/cve/CVE-2020-10957/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10958 page", "url": "https://www.suse.com/security/cve/CVE-2020-10958/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10967 page", "url": "https://www.suse.com/security/cve/CVE-2020-10967/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12100 page", "url": "https://www.suse.com/security/cve/CVE-2020-12100/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12673 page", "url": "https://www.suse.com/security/cve/CVE-2020-12673/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12674 page", "url": "https://www.suse.com/security/cve/CVE-2020-12674/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24386 page", "url": "https://www.suse.com/security/cve/CVE-2020-24386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28200 page", "url": "https://www.suse.com/security/cve/CVE-2020-28200/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-7046 page", "url": "https://www.suse.com/security/cve/CVE-2020-7046/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-7957 page", "url": "https://www.suse.com/security/cve/CVE-2020-7957/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-29157 page", "url": "https://www.suse.com/security/cve/CVE-2021-29157/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33515 page", "url": "https://www.suse.com/security/cve/CVE-2021-33515/" } ], "title": "dovecot23-2.3.16-1.6 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10726-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dovecot23-2.3.16-1.6.aarch64", "product": { "name": "dovecot23-2.3.16-1.6.aarch64", "product_id": "dovecot23-2.3.16-1.6.aarch64" } }, { "category": "product_version", "name": "dovecot23-backend-mysql-2.3.16-1.6.aarch64", "product": { "name": "dovecot23-backend-mysql-2.3.16-1.6.aarch64", "product_id": "dovecot23-backend-mysql-2.3.16-1.6.aarch64" } }, { "category": "product_version", "name": "dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "product": { "name": "dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "product_id": "dovecot23-backend-pgsql-2.3.16-1.6.aarch64" } }, { "category": "product_version", "name": "dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "product": { "name": "dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "product_id": "dovecot23-backend-sqlite-2.3.16-1.6.aarch64" } }, { "category": "product_version", "name": "dovecot23-devel-2.3.16-1.6.aarch64", "product": { "name": "dovecot23-devel-2.3.16-1.6.aarch64", "product_id": "dovecot23-devel-2.3.16-1.6.aarch64" } }, { "category": "product_version", "name": "dovecot23-fts-2.3.16-1.6.aarch64", "product": { "name": "dovecot23-fts-2.3.16-1.6.aarch64", "product_id": "dovecot23-fts-2.3.16-1.6.aarch64" } }, { "category": "product_version", "name": "dovecot23-fts-lucene-2.3.16-1.6.aarch64", "product": { "name": "dovecot23-fts-lucene-2.3.16-1.6.aarch64", "product_id": "dovecot23-fts-lucene-2.3.16-1.6.aarch64" } }, { "category": "product_version", "name": "dovecot23-fts-solr-2.3.16-1.6.aarch64", "product": { "name": "dovecot23-fts-solr-2.3.16-1.6.aarch64", "product_id": "dovecot23-fts-solr-2.3.16-1.6.aarch64" } }, { "category": "product_version", "name": "dovecot23-fts-squat-2.3.16-1.6.aarch64", "product": { "name": "dovecot23-fts-squat-2.3.16-1.6.aarch64", "product_id": "dovecot23-fts-squat-2.3.16-1.6.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dovecot23-2.3.16-1.6.ppc64le", "product": { "name": "dovecot23-2.3.16-1.6.ppc64le", "product_id": "dovecot23-2.3.16-1.6.ppc64le" } }, { "category": "product_version", "name": "dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "product": { "name": "dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "product_id": "dovecot23-backend-mysql-2.3.16-1.6.ppc64le" } }, { "category": "product_version", "name": "dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "product": { "name": "dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "product_id": "dovecot23-backend-pgsql-2.3.16-1.6.ppc64le" } }, { "category": "product_version", "name": "dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "product": { "name": "dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "product_id": "dovecot23-backend-sqlite-2.3.16-1.6.ppc64le" } }, { "category": "product_version", "name": "dovecot23-devel-2.3.16-1.6.ppc64le", "product": { "name": "dovecot23-devel-2.3.16-1.6.ppc64le", "product_id": "dovecot23-devel-2.3.16-1.6.ppc64le" } }, { "category": "product_version", "name": "dovecot23-fts-2.3.16-1.6.ppc64le", "product": { "name": "dovecot23-fts-2.3.16-1.6.ppc64le", "product_id": "dovecot23-fts-2.3.16-1.6.ppc64le" } }, { "category": "product_version", "name": "dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "product": { "name": "dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "product_id": "dovecot23-fts-lucene-2.3.16-1.6.ppc64le" } }, { "category": "product_version", "name": "dovecot23-fts-solr-2.3.16-1.6.ppc64le", "product": { "name": "dovecot23-fts-solr-2.3.16-1.6.ppc64le", "product_id": "dovecot23-fts-solr-2.3.16-1.6.ppc64le" } }, { "category": "product_version", "name": "dovecot23-fts-squat-2.3.16-1.6.ppc64le", "product": { "name": "dovecot23-fts-squat-2.3.16-1.6.ppc64le", "product_id": "dovecot23-fts-squat-2.3.16-1.6.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dovecot23-2.3.16-1.6.s390x", "product": { "name": "dovecot23-2.3.16-1.6.s390x", "product_id": "dovecot23-2.3.16-1.6.s390x" } }, { "category": "product_version", "name": "dovecot23-backend-mysql-2.3.16-1.6.s390x", "product": { "name": "dovecot23-backend-mysql-2.3.16-1.6.s390x", "product_id": "dovecot23-backend-mysql-2.3.16-1.6.s390x" } }, { "category": "product_version", "name": "dovecot23-backend-pgsql-2.3.16-1.6.s390x", "product": { "name": "dovecot23-backend-pgsql-2.3.16-1.6.s390x", "product_id": "dovecot23-backend-pgsql-2.3.16-1.6.s390x" } }, { "category": "product_version", "name": "dovecot23-backend-sqlite-2.3.16-1.6.s390x", "product": { "name": "dovecot23-backend-sqlite-2.3.16-1.6.s390x", "product_id": "dovecot23-backend-sqlite-2.3.16-1.6.s390x" } }, { "category": "product_version", "name": "dovecot23-devel-2.3.16-1.6.s390x", "product": { "name": "dovecot23-devel-2.3.16-1.6.s390x", "product_id": "dovecot23-devel-2.3.16-1.6.s390x" } }, { "category": "product_version", "name": "dovecot23-fts-2.3.16-1.6.s390x", "product": { "name": "dovecot23-fts-2.3.16-1.6.s390x", "product_id": "dovecot23-fts-2.3.16-1.6.s390x" } }, { "category": "product_version", "name": "dovecot23-fts-lucene-2.3.16-1.6.s390x", "product": { "name": "dovecot23-fts-lucene-2.3.16-1.6.s390x", "product_id": "dovecot23-fts-lucene-2.3.16-1.6.s390x" } }, { "category": "product_version", "name": "dovecot23-fts-solr-2.3.16-1.6.s390x", "product": { "name": "dovecot23-fts-solr-2.3.16-1.6.s390x", "product_id": "dovecot23-fts-solr-2.3.16-1.6.s390x" } }, { "category": "product_version", "name": "dovecot23-fts-squat-2.3.16-1.6.s390x", "product": { "name": "dovecot23-fts-squat-2.3.16-1.6.s390x", "product_id": "dovecot23-fts-squat-2.3.16-1.6.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dovecot23-2.3.16-1.6.x86_64", "product": { "name": "dovecot23-2.3.16-1.6.x86_64", "product_id": "dovecot23-2.3.16-1.6.x86_64" } }, { "category": "product_version", "name": "dovecot23-backend-mysql-2.3.16-1.6.x86_64", "product": { "name": "dovecot23-backend-mysql-2.3.16-1.6.x86_64", "product_id": "dovecot23-backend-mysql-2.3.16-1.6.x86_64" } }, { "category": "product_version", "name": "dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "product": { "name": "dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "product_id": "dovecot23-backend-pgsql-2.3.16-1.6.x86_64" } }, { "category": "product_version", "name": "dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "product": { "name": "dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "product_id": "dovecot23-backend-sqlite-2.3.16-1.6.x86_64" } }, { "category": "product_version", "name": "dovecot23-devel-2.3.16-1.6.x86_64", "product": { "name": "dovecot23-devel-2.3.16-1.6.x86_64", "product_id": "dovecot23-devel-2.3.16-1.6.x86_64" } }, { "category": "product_version", "name": "dovecot23-fts-2.3.16-1.6.x86_64", "product": { "name": "dovecot23-fts-2.3.16-1.6.x86_64", "product_id": "dovecot23-fts-2.3.16-1.6.x86_64" } }, { "category": "product_version", "name": "dovecot23-fts-lucene-2.3.16-1.6.x86_64", "product": { "name": "dovecot23-fts-lucene-2.3.16-1.6.x86_64", "product_id": "dovecot23-fts-lucene-2.3.16-1.6.x86_64" } }, { "category": "product_version", "name": "dovecot23-fts-solr-2.3.16-1.6.x86_64", "product": { "name": "dovecot23-fts-solr-2.3.16-1.6.x86_64", "product_id": "dovecot23-fts-solr-2.3.16-1.6.x86_64" } }, { "category": "product_version", "name": "dovecot23-fts-squat-2.3.16-1.6.x86_64", "product": { "name": "dovecot23-fts-squat-2.3.16-1.6.x86_64", "product_id": "dovecot23-fts-squat-2.3.16-1.6.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dovecot23-2.3.16-1.6.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64" }, "product_reference": "dovecot23-2.3.16-1.6.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-2.3.16-1.6.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le" }, "product_reference": "dovecot23-2.3.16-1.6.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-2.3.16-1.6.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x" }, "product_reference": "dovecot23-2.3.16-1.6.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-2.3.16-1.6.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64" }, "product_reference": "dovecot23-2.3.16-1.6.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-mysql-2.3.16-1.6.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64" }, "product_reference": "dovecot23-backend-mysql-2.3.16-1.6.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-mysql-2.3.16-1.6.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le" }, "product_reference": "dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-mysql-2.3.16-1.6.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x" }, "product_reference": "dovecot23-backend-mysql-2.3.16-1.6.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-mysql-2.3.16-1.6.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64" }, "product_reference": "dovecot23-backend-mysql-2.3.16-1.6.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-pgsql-2.3.16-1.6.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64" }, "product_reference": "dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-pgsql-2.3.16-1.6.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le" }, "product_reference": "dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-pgsql-2.3.16-1.6.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x" }, "product_reference": "dovecot23-backend-pgsql-2.3.16-1.6.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-pgsql-2.3.16-1.6.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64" }, "product_reference": "dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-sqlite-2.3.16-1.6.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64" }, "product_reference": "dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-sqlite-2.3.16-1.6.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le" }, "product_reference": "dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-sqlite-2.3.16-1.6.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x" }, "product_reference": "dovecot23-backend-sqlite-2.3.16-1.6.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-sqlite-2.3.16-1.6.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64" }, "product_reference": "dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-devel-2.3.16-1.6.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64" }, "product_reference": "dovecot23-devel-2.3.16-1.6.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-devel-2.3.16-1.6.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le" }, "product_reference": "dovecot23-devel-2.3.16-1.6.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-devel-2.3.16-1.6.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x" }, "product_reference": "dovecot23-devel-2.3.16-1.6.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-devel-2.3.16-1.6.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64" }, "product_reference": "dovecot23-devel-2.3.16-1.6.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-2.3.16-1.6.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64" }, "product_reference": "dovecot23-fts-2.3.16-1.6.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-2.3.16-1.6.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le" }, "product_reference": "dovecot23-fts-2.3.16-1.6.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-2.3.16-1.6.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x" }, "product_reference": "dovecot23-fts-2.3.16-1.6.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-2.3.16-1.6.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64" }, "product_reference": "dovecot23-fts-2.3.16-1.6.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-lucene-2.3.16-1.6.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64" }, "product_reference": "dovecot23-fts-lucene-2.3.16-1.6.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-lucene-2.3.16-1.6.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le" }, "product_reference": "dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-lucene-2.3.16-1.6.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x" }, "product_reference": "dovecot23-fts-lucene-2.3.16-1.6.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-lucene-2.3.16-1.6.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64" }, "product_reference": "dovecot23-fts-lucene-2.3.16-1.6.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-solr-2.3.16-1.6.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64" }, "product_reference": "dovecot23-fts-solr-2.3.16-1.6.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-solr-2.3.16-1.6.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le" }, "product_reference": "dovecot23-fts-solr-2.3.16-1.6.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-solr-2.3.16-1.6.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x" }, "product_reference": "dovecot23-fts-solr-2.3.16-1.6.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-solr-2.3.16-1.6.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64" }, "product_reference": "dovecot23-fts-solr-2.3.16-1.6.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-squat-2.3.16-1.6.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64" }, "product_reference": "dovecot23-fts-squat-2.3.16-1.6.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-squat-2.3.16-1.6.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le" }, "product_reference": "dovecot23-fts-squat-2.3.16-1.6.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-squat-2.3.16-1.6.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x" }, "product_reference": "dovecot23-fts-squat-2.3.16-1.6.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-squat-2.3.16-1.6.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" }, "product_reference": "dovecot23-fts-squat-2.3.16-1.6.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-14461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14461" } ], "notes": [ { "category": "general", "text": "A specially crafted email delivered over SMTP and passed on to Dovecot by MTA can trigger an out of bounds read resulting in potential sensitive information disclosure and denial of service. In order to trigger this vulnerability, an attacker needs to send a specially crafted email message to the server.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14461", "url": "https://www.suse.com/security/cve/CVE-2017-14461" }, { "category": "external", "summary": "SUSE Bug 1082826 for CVE-2017-14461", "url": "https://bugzilla.suse.com/1082826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-14461" }, { "cve": "CVE-2017-15130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15130" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15130", "url": "https://www.suse.com/security/cve/CVE-2017-15130" }, { "category": "external", "summary": "SUSE Bug 1082828 for CVE-2017-15130", "url": "https://bugzilla.suse.com/1082828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15130" }, { "cve": "CVE-2017-15132", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15132" } ], "notes": [ { "category": "general", "text": "A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot\u0027s auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15132", "url": "https://www.suse.com/security/cve/CVE-2017-15132" }, { "category": "external", "summary": "SUSE Bug 1075608 for CVE-2017-15132", "url": "https://bugzilla.suse.com/1075608" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15132" }, { "cve": "CVE-2019-10691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10691" } ], "notes": [ { "category": "general", "text": "The JSON encoder in Dovecot before 2.3.5.2 allows attackers to repeatedly crash the authentication service by attempting to authenticate with an invalid UTF-8 sequence as the username.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10691", "url": "https://www.suse.com/security/cve/CVE-2019-10691" }, { "category": "external", "summary": "SUSE Bug 1132501 for CVE-2019-10691", "url": "https://bugzilla.suse.com/1132501" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-10691" }, { "cve": "CVE-2019-11494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11494" } ], "notes": [ { "category": "general", "text": "In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login service crashes when the client disconnects prematurely during the AUTH command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11494", "url": "https://www.suse.com/security/cve/CVE-2019-11494" }, { "category": "external", "summary": "SUSE Bug 1133624 for CVE-2019-11494", "url": "https://bugzilla.suse.com/1133624" }, { "category": "external", "summary": "SUSE Bug 1133625 for CVE-2019-11494", "url": "https://bugzilla.suse.com/1133625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11494" }, { "cve": "CVE-2019-11499", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11499" } ], "notes": [ { "category": "general", "text": "In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login component crashes if AUTH PLAIN is attempted over a TLS secured channel with an unacceptable authentication message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11499", "url": "https://www.suse.com/security/cve/CVE-2019-11499" }, { "category": "external", "summary": "SUSE Bug 1133624 for CVE-2019-11499", "url": "https://bugzilla.suse.com/1133624" }, { "category": "external", "summary": "SUSE Bug 1133625 for CVE-2019-11499", "url": "https://bugzilla.suse.com/1133625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11499" }, { "cve": "CVE-2019-11500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11500" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because \u0027\\0\u0027 characters are mishandled, and can lead to out-of-bounds writes and remote code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11500", "url": "https://www.suse.com/security/cve/CVE-2019-11500" }, { "category": "external", "summary": "SUSE Bug 1145559 for CVE-2019-11500", "url": "https://bugzilla.suse.com/1145559" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11500" }, { "cve": "CVE-2019-19722", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19722" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.3.9.2, an attacker can crash a push-notification driver with a crafted email when push notifications are used, because of a NULL Pointer Dereference. The email must use a group address as either the sender or the recipient.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19722", "url": "https://www.suse.com/security/cve/CVE-2019-19722" }, { "category": "external", "summary": "SUSE Bug 1159090 for CVE-2019-19722", "url": "https://bugzilla.suse.com/1159090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19722" }, { "cve": "CVE-2019-3814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3814" } ], "notes": [ { "category": "general", "text": "It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3814", "url": "https://www.suse.com/security/cve/CVE-2019-3814" }, { "category": "external", "summary": "SUSE Bug 1123022 for CVE-2019-3814", "url": "https://bugzilla.suse.com/1123022" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-3814" }, { "cve": "CVE-2019-7524", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7524" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.2.36.3 and 2.3.x before 2.3.5.1, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7524", "url": "https://www.suse.com/security/cve/CVE-2019-7524" }, { "category": "external", "summary": "SUSE Bug 1130116 for CVE-2019-7524", "url": "https://bugzilla.suse.com/1130116" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7524" }, { "cve": "CVE-2020-10957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10957" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.3.10.1, unauthenticated sending of malformed parameters to a NOOP command causes a NULL Pointer Dereference and crash in submission-login, submission, or lmtp.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10957", "url": "https://www.suse.com/security/cve/CVE-2020-10957" }, { "category": "external", "summary": "SUSE Bug 1171457 for CVE-2020-10957", "url": "https://bugzilla.suse.com/1171457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-10957" }, { "cve": "CVE-2020-10958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10958" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.3.10.1, a crafted SMTP/LMTP message triggers an unauthenticated use-after-free bug in submission-login, submission, or lmtp, and can lead to a crash under circumstances involving many newlines after a command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10958", "url": "https://www.suse.com/security/cve/CVE-2020-10958" }, { "category": "external", "summary": "SUSE Bug 1171458 for CVE-2020-10958", "url": "https://bugzilla.suse.com/1171458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10958" }, { "cve": "CVE-2020-10967", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10967" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.3.10.1, remote unauthenticated attackers can crash the lmtp or submission process by sending mail with an empty localpart.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10967", "url": "https://www.suse.com/security/cve/CVE-2020-10967" }, { "category": "external", "summary": "SUSE Bug 1171456 for CVE-2020-10967", "url": "https://bugzilla.suse.com/1171456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10967" }, { "cve": "CVE-2020-12100", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12100" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.3.11.3, uncontrolled recursion in submission, lmtp, and lda allows remote attackers to cause a denial of service (resource consumption) via a crafted e-mail message with deeply nested MIME parts.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12100", "url": "https://www.suse.com/security/cve/CVE-2020-12100" }, { "category": "external", "summary": "SUSE Bug 1174920 for CVE-2020-12100", "url": "https://bugzilla.suse.com/1174920" }, { "category": "external", "summary": "SUSE Bug 1180406 for CVE-2020-12100", "url": "https://bugzilla.suse.com/1180406" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12100" }, { "cve": "CVE-2020-12673", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12673" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12673", "url": "https://www.suse.com/security/cve/CVE-2020-12673" }, { "category": "external", "summary": "SUSE Bug 1174920 for CVE-2020-12673", "url": "https://bugzilla.suse.com/1174920" }, { "category": "external", "summary": "SUSE Bug 1174922 for CVE-2020-12673", "url": "https://bugzilla.suse.com/1174922" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12673" }, { "cve": "CVE-2020-12674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12674" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12674", "url": "https://www.suse.com/security/cve/CVE-2020-12674" }, { "category": "external", "summary": "SUSE Bug 1174920 for CVE-2020-12674", "url": "https://bugzilla.suse.com/1174920" }, { "category": "external", "summary": "SUSE Bug 1174923 for CVE-2020-12674", "url": "https://bugzilla.suse.com/1174923" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12674" }, { "cve": "CVE-2020-24386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24386" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Dovecot before 2.3.13. By using IMAP IDLE, an authenticated attacker can trigger unhibernation via attacker-controlled parameters, leading to access to other users\u0027 email messages (and path disclosure).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24386", "url": "https://www.suse.com/security/cve/CVE-2020-24386" }, { "category": "external", "summary": "SUSE Bug 1180405 for CVE-2020-24386", "url": "https://bugzilla.suse.com/1180405" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-24386" }, { "cve": "CVE-2020-28200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28200" } ], "notes": [ { "category": "general", "text": "The Sieve engine in Dovecot before 2.3.15 allows Uncontrolled Resource Consumption, as demonstrated by a situation with a complex regular expression for the regex extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28200", "url": "https://www.suse.com/security/cve/CVE-2020-28200" }, { "category": "external", "summary": "SUSE Bug 1187420 for CVE-2020-28200", "url": "https://bugzilla.suse.com/1187420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-28200" }, { "cve": "CVE-2020-7046", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-7046" } ], "notes": [ { "category": "general", "text": "lib-smtp in submission-login and lmtp in Dovecot 2.3.9 before 2.3.9.3 mishandles truncated UTF-8 data in command parameters, as demonstrated by the unauthenticated triggering of a submission-login infinite loop.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-7046", "url": "https://www.suse.com/security/cve/CVE-2020-7046" }, { "category": "external", "summary": "SUSE Bug 1162773 for CVE-2020-7046", "url": "https://bugzilla.suse.com/1162773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-7046" }, { "cve": "CVE-2020-7957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-7957" } ], "notes": [ { "category": "general", "text": "The IMAP and LMTP components in Dovecot 2.3.9 before 2.3.9.3 mishandle snippet generation when many characters must be read to compute the snippet and a trailing \u003e character exists. This causes a denial of service in which the recipient cannot read all of their messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-7957", "url": "https://www.suse.com/security/cve/CVE-2020-7957" }, { "category": "external", "summary": "SUSE Bug 1162773 for CVE-2020-7957", "url": "https://bugzilla.suse.com/1162773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-7957" }, { "cve": "CVE-2021-29157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-29157" } ], "notes": [ { "category": "general", "text": "Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access to the local filesystem can trick OAuth2 authentication into using an HS256 validation key from an attacker-controlled location. This occurs during use of local JWT validation with the posix fs driver.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-29157", "url": "https://www.suse.com/security/cve/CVE-2021-29157" }, { "category": "external", "summary": "SUSE Bug 1187418 for CVE-2021-29157", "url": "https://bugzilla.suse.com/1187418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-29157" }, { "cve": "CVE-2021-33515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33515" } ], "notes": [ { "category": "general", "text": "The submission service in Dovecot before 2.3.15 allows STARTTLS command injection in lib-smtp. Sensitive information can be redirected to an attacker-controlled address.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33515", "url": "https://www.suse.com/security/cve/CVE-2021-33515" }, { "category": "external", "summary": "SUSE Bug 1187419 for CVE-2021-33515", "url": "https://bugzilla.suse.com/1187419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-devel-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-solr-2.3.16-1.6.x86_64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.aarch64", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.ppc64le", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.s390x", "openSUSE Tumbleweed:dovecot23-fts-squat-2.3.16-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-33515" } ] }
rhsa-2020:1062
Vulnerability from csaf_redhat
Published
2020-03-31 21:10
Modified
2024-11-22 13:38
Summary
Red Hat Security Advisory: dovecot security and bug fix update
Notes
Topic
An update for dovecot is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages.
Security Fix(es):
* dovecot: Improper certificate validation (CVE-2019-3814)
* dovecot: Buffer overflow in indexer-worker process results in privilege escalation (CVE-2019-7524)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dovecot is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. \n\nSecurity Fix(es):\n\n* dovecot: Improper certificate validation (CVE-2019-3814)\n\n* dovecot: Buffer overflow in indexer-worker process results in privilege escalation (CVE-2019-7524)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1062", "url": "https://access.redhat.com/errata/RHSA-2020:1062" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index" }, { "category": "external", "summary": "1570283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570283" }, { "category": "external", "summary": "1673415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1673415" }, { "category": "external", "summary": "1696152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696152" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1062.json" } ], "title": "Red Hat Security Advisory: dovecot security and bug fix update", "tracking": { "current_release_date": "2024-11-22T13:38:32+00:00", "generator": { "date": "2024-11-22T13:38:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:1062", "initial_release_date": "2020-03-31T21:10:24+00:00", "revision_history": [ { "date": "2020-03-31T21:10:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-31T21:10:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T13:38:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dovecot-devel-1:2.2.36-6.el7.s390x", "product": { "name": "dovecot-devel-1:2.2.36-6.el7.s390x", "product_id": "dovecot-devel-1:2.2.36-6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-devel@2.2.36-6.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debuginfo-1:2.2.36-6.el7.s390x", "product": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.s390x", "product_id": "dovecot-debuginfo-1:2.2.36-6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debuginfo@2.2.36-6.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-1:2.2.36-6.el7.s390x", "product": { "name": "dovecot-1:2.2.36-6.el7.s390x", "product_id": "dovecot-1:2.2.36-6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot@2.2.36-6.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-mysql-1:2.2.36-6.el7.s390x", "product": { "name": "dovecot-mysql-1:2.2.36-6.el7.s390x", "product_id": "dovecot-mysql-1:2.2.36-6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-mysql@2.2.36-6.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pgsql-1:2.2.36-6.el7.s390x", "product": { "name": "dovecot-pgsql-1:2.2.36-6.el7.s390x", "product_id": "dovecot-pgsql-1:2.2.36-6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pgsql@2.2.36-6.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "product": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "product_id": "dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pigeonhole@2.2.36-6.el7?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dovecot-devel-1:2.2.36-6.el7.ppc64", "product": { "name": "dovecot-devel-1:2.2.36-6.el7.ppc64", "product_id": "dovecot-devel-1:2.2.36-6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-devel@2.2.36-6.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "product": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "product_id": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debuginfo@2.2.36-6.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-1:2.2.36-6.el7.ppc64", "product": { "name": "dovecot-1:2.2.36-6.el7.ppc64", "product_id": "dovecot-1:2.2.36-6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot@2.2.36-6.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-mysql-1:2.2.36-6.el7.ppc64", "product": { "name": "dovecot-mysql-1:2.2.36-6.el7.ppc64", "product_id": "dovecot-mysql-1:2.2.36-6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-mysql@2.2.36-6.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pgsql-1:2.2.36-6.el7.ppc64", "product": { "name": "dovecot-pgsql-1:2.2.36-6.el7.ppc64", "product_id": "dovecot-pgsql-1:2.2.36-6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pgsql@2.2.36-6.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "product": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "product_id": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pigeonhole@2.2.36-6.el7?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dovecot-devel-1:2.2.36-6.el7.ppc64le", "product": { "name": "dovecot-devel-1:2.2.36-6.el7.ppc64le", "product_id": "dovecot-devel-1:2.2.36-6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-devel@2.2.36-6.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "product": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "product_id": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debuginfo@2.2.36-6.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-1:2.2.36-6.el7.ppc64le", "product": { "name": "dovecot-1:2.2.36-6.el7.ppc64le", "product_id": "dovecot-1:2.2.36-6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot@2.2.36-6.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-mysql-1:2.2.36-6.el7.ppc64le", "product": { "name": "dovecot-mysql-1:2.2.36-6.el7.ppc64le", "product_id": "dovecot-mysql-1:2.2.36-6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-mysql@2.2.36-6.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "product": { "name": "dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "product_id": "dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pgsql@2.2.36-6.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "product": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "product_id": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pigeonhole@2.2.36-6.el7?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dovecot-devel-1:2.2.36-6.el7.x86_64", "product": { "name": "dovecot-devel-1:2.2.36-6.el7.x86_64", "product_id": "dovecot-devel-1:2.2.36-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-devel@2.2.36-6.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "product": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "product_id": "dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debuginfo@2.2.36-6.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-1:2.2.36-6.el7.x86_64", "product": { "name": "dovecot-1:2.2.36-6.el7.x86_64", "product_id": "dovecot-1:2.2.36-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot@2.2.36-6.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-mysql-1:2.2.36-6.el7.x86_64", "product": { "name": "dovecot-mysql-1:2.2.36-6.el7.x86_64", "product_id": "dovecot-mysql-1:2.2.36-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-mysql@2.2.36-6.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pgsql-1:2.2.36-6.el7.x86_64", "product": { "name": "dovecot-pgsql-1:2.2.36-6.el7.x86_64", "product_id": "dovecot-pgsql-1:2.2.36-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pgsql@2.2.36-6.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "product": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "product_id": "dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pigeonhole@2.2.36-6.el7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dovecot-1:2.2.36-6.el7.i686", "product": { "name": "dovecot-1:2.2.36-6.el7.i686", "product_id": "dovecot-1:2.2.36-6.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot@2.2.36-6.el7?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debuginfo-1:2.2.36-6.el7.i686", "product": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.i686", "product_id": "dovecot-debuginfo-1:2.2.36-6.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debuginfo@2.2.36-6.el7?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "dovecot-1:2.2.36-6.el7.src", "product": { "name": "dovecot-1:2.2.36-6.el7.src", "product_id": "dovecot-1:2.2.36-6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot@2.2.36-6.el7?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dovecot-1:2.2.36-6.el7.s390", "product": { "name": "dovecot-1:2.2.36-6.el7.s390", "product_id": "dovecot-1:2.2.36-6.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot@2.2.36-6.el7?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debuginfo-1:2.2.36-6.el7.s390", "product": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.s390", "product_id": "dovecot-debuginfo-1:2.2.36-6.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debuginfo@2.2.36-6.el7?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "dovecot-1:2.2.36-6.el7.ppc", "product": { "name": "dovecot-1:2.2.36-6.el7.ppc", "product_id": "dovecot-1:2.2.36-6.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot@2.2.36-6.el7?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc", "product": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc", "product_id": "dovecot-debuginfo-1:2.2.36-6.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debuginfo@2.2.36-6.el7?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-1:2.2.36-6.el7.i686" }, "product_reference": "dovecot-1:2.2.36-6.el7.i686", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc" }, "product_reference": "dovecot-1:2.2.36-6.el7.ppc", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-1:2.2.36-6.el7.s390" }, "product_reference": "dovecot-1:2.2.36-6.el7.s390", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-1:2.2.36-6.el7.src" }, "product_reference": "dovecot-1:2.2.36-6.el7.src", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.i686", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.ppc", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.s390", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Server-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.i686" }, "product_reference": "dovecot-1:2.2.36-6.el7.i686", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc" }, "product_reference": "dovecot-1:2.2.36-6.el7.ppc", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390" }, "product_reference": "dovecot-1:2.2.36-6.el7.s390", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.src" }, "product_reference": "dovecot-1:2.2.36-6.el7.src", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.i686", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.ppc", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.s390", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-1:2.2.36-6.el7.i686" }, "product_reference": "dovecot-1:2.2.36-6.el7.i686", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc" }, "product_reference": "dovecot-1:2.2.36-6.el7.ppc", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390" }, "product_reference": "dovecot-1:2.2.36-6.el7.s390", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-1:2.2.36-6.el7.src" }, "product_reference": "dovecot-1:2.2.36-6.el7.src", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.i686", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.ppc", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.s390", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.i686" }, "product_reference": "dovecot-1:2.2.36-6.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc" }, "product_reference": "dovecot-1:2.2.36-6.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390" }, "product_reference": "dovecot-1:2.2.36-6.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.src" }, "product_reference": "dovecot-1:2.2.36-6.el7.src", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-devel-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-mysql-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-pgsql-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.8" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3814", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2019-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1673415" } ], "notes": [ { "category": "description", "text": "It was discovered that Dovecot incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.", "title": "Vulnerability description" }, { "category": "summary", "text": "dovecot: Improper certificate validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.8:dovecot-1:2.2.36-6.el7.i686", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-1:2.2.36-6.el7.s390", "7Server-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-1:2.2.36-6.el7.src", "7Server-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.i686", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.src", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.i686", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.src", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.i686", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.src", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3814" }, { "category": "external", "summary": "RHBZ#1673415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1673415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3814", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3814" }, { "category": "external", "summary": "https://www.dovecot.org/list/dovecot/2019-February/114575.html", "url": "https://www.dovecot.org/list/dovecot/2019-February/114575.html" } ], "release_date": "2019-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-31T21:10:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.8:dovecot-1:2.2.36-6.el7.i686", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-1:2.2.36-6.el7.s390", "7Server-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-1:2.2.36-6.el7.src", "7Server-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.i686", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.src", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.i686", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.src", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.i686", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.src", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1062" }, { "category": "workaround", "details": "Attack can be migitated by having the certificates with proper Extended Key Usage, such as \u0027TLS Web Server\u0027 and \u0027TLS Web Server Client\u0027. Also client-side certification authentication can be turned off using:\nauth_ssl_require_client_cert = no\nauth_ssl_username_from_cert = no", "product_ids": [ "7Server-7.8:dovecot-1:2.2.36-6.el7.i686", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-1:2.2.36-6.el7.s390", "7Server-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-1:2.2.36-6.el7.src", "7Server-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.i686", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.src", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.i686", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.src", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.i686", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.src", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-7.8:dovecot-1:2.2.36-6.el7.i686", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-1:2.2.36-6.el7.s390", "7Server-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-1:2.2.36-6.el7.src", "7Server-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.i686", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.src", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.i686", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.src", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.i686", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.src", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dovecot: Improper certificate validation" }, { "cve": "CVE-2019-7524", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-03-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1696152" } ], "notes": [ { "category": "description", "text": "In Dovecot before 2.2.36.3 and 2.3.x before 2.3.5.1, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components.", "title": "Vulnerability description" }, { "category": "summary", "text": "dovecot: Buffer overflow in indexer-worker process results in privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.8:dovecot-1:2.2.36-6.el7.i686", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-1:2.2.36-6.el7.s390", "7Server-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-1:2.2.36-6.el7.src", "7Server-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.i686", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.src", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.i686", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.src", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.i686", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.src", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-7524" }, { "category": "external", "summary": "RHBZ#1696152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696152" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-7524", "url": "https://www.cve.org/CVERecord?id=CVE-2019-7524" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7524", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7524" }, { "category": "external", "summary": "https://dovecot.org/list/dovecot-news/2019-March/000403.html", "url": "https://dovecot.org/list/dovecot-news/2019-March/000403.html" } ], "release_date": "2019-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-31T21:10:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.8:dovecot-1:2.2.36-6.el7.i686", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-1:2.2.36-6.el7.s390", "7Server-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-1:2.2.36-6.el7.src", "7Server-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.i686", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.src", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.i686", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.src", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.i686", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.src", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1062" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-7.8:dovecot-1:2.2.36-6.el7.i686", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-1:2.2.36-6.el7.s390", "7Server-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-1:2.2.36-6.el7.src", "7Server-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Server-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.i686", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.src", "7Server-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Server-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.i686", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.src", "7Workstation-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Workstation-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.i686", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.src", "7Workstation-optional-7.8:dovecot-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.i686", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-debuginfo-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-devel-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-mysql-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-pgsql-1:2.2.36-6.el7.x86_64", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.ppc64le", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.s390x", "7Workstation-optional-7.8:dovecot-pigeonhole-1:2.2.36-6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dovecot: Buffer overflow in indexer-worker process results in privilege escalation" } ] }
rhsa-2019:3467
Vulnerability from csaf_redhat
Published
2019-11-05 21:29
Modified
2024-11-22 13:26
Summary
Red Hat Security Advisory: dovecot security and bug fix update
Notes
Topic
An update for dovecot is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages.
Security Fix(es):
* dovecot: Improper certificate validation (CVE-2019-3814)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for dovecot is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. \n\nSecurity Fix(es):\n\n* dovecot: Improper certificate validation (CVE-2019-3814)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3467", "url": "https://access.redhat.com/errata/RHSA-2019:3467" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/" }, { "category": "external", "summary": "1673415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1673415" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3467.json" } ], "title": "Red Hat Security Advisory: dovecot security and bug fix update", "tracking": { "current_release_date": "2024-11-22T13:26:17+00:00", "generator": { "date": "2024-11-22T13:26:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:3467", "initial_release_date": "2019-11-05T21:29:22+00:00", "revision_history": [ { "date": "2019-11-05T21:29:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-05T21:29:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T13:26:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dovecot-1:2.2.36-10.el8.i686", "product": { "name": "dovecot-1:2.2.36-10.el8.i686", "product_id": "dovecot-1:2.2.36-10.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot@2.2.36-10.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-devel-1:2.2.36-10.el8.i686", "product": { "name": "dovecot-devel-1:2.2.36-10.el8.i686", "product_id": "dovecot-devel-1:2.2.36-10.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-devel@2.2.36-10.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debugsource-1:2.2.36-10.el8.i686", "product": { "name": "dovecot-debugsource-1:2.2.36-10.el8.i686", "product_id": "dovecot-debugsource-1:2.2.36-10.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debugsource@2.2.36-10.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debuginfo-1:2.2.36-10.el8.i686", "product": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.i686", "product_id": "dovecot-debuginfo-1:2.2.36-10.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debuginfo@2.2.36-10.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686", "product": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686", "product_id": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-mysql-debuginfo@2.2.36-10.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686", "product": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686", "product_id": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pgsql-debuginfo@2.2.36-10.el8?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686", "product": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686", "product_id": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pigeonhole-debuginfo@2.2.36-10.el8?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "dovecot-devel-1:2.2.36-10.el8.x86_64", "product": { "name": "dovecot-devel-1:2.2.36-10.el8.x86_64", "product_id": "dovecot-devel-1:2.2.36-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-devel@2.2.36-10.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debugsource-1:2.2.36-10.el8.x86_64", "product": { "name": "dovecot-debugsource-1:2.2.36-10.el8.x86_64", "product_id": "dovecot-debugsource-1:2.2.36-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debugsource@2.2.36-10.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debuginfo-1:2.2.36-10.el8.x86_64", "product": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.x86_64", "product_id": "dovecot-debuginfo-1:2.2.36-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debuginfo@2.2.36-10.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64", "product": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64", "product_id": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-mysql-debuginfo@2.2.36-10.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64", "product": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64", "product_id": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pgsql-debuginfo@2.2.36-10.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64", "product": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64", "product_id": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pigeonhole-debuginfo@2.2.36-10.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-1:2.2.36-10.el8.x86_64", "product": { "name": "dovecot-1:2.2.36-10.el8.x86_64", "product_id": "dovecot-1:2.2.36-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot@2.2.36-10.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-mysql-1:2.2.36-10.el8.x86_64", "product": { "name": "dovecot-mysql-1:2.2.36-10.el8.x86_64", "product_id": "dovecot-mysql-1:2.2.36-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-mysql@2.2.36-10.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pgsql-1:2.2.36-10.el8.x86_64", "product": { "name": "dovecot-pgsql-1:2.2.36-10.el8.x86_64", "product_id": "dovecot-pgsql-1:2.2.36-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pgsql@2.2.36-10.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pigeonhole-1:2.2.36-10.el8.x86_64", "product": { "name": "dovecot-pigeonhole-1:2.2.36-10.el8.x86_64", "product_id": "dovecot-pigeonhole-1:2.2.36-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pigeonhole@2.2.36-10.el8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dovecot-devel-1:2.2.36-10.el8.ppc64le", "product": { "name": "dovecot-devel-1:2.2.36-10.el8.ppc64le", "product_id": "dovecot-devel-1:2.2.36-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-devel@2.2.36-10.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debugsource-1:2.2.36-10.el8.ppc64le", "product": { "name": "dovecot-debugsource-1:2.2.36-10.el8.ppc64le", "product_id": "dovecot-debugsource-1:2.2.36-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debugsource@2.2.36-10.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debuginfo-1:2.2.36-10.el8.ppc64le", "product": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.ppc64le", "product_id": "dovecot-debuginfo-1:2.2.36-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debuginfo@2.2.36-10.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le", "product": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le", "product_id": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-mysql-debuginfo@2.2.36-10.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le", "product": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le", "product_id": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pgsql-debuginfo@2.2.36-10.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le", "product": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le", "product_id": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pigeonhole-debuginfo@2.2.36-10.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-1:2.2.36-10.el8.ppc64le", "product": { "name": "dovecot-1:2.2.36-10.el8.ppc64le", "product_id": "dovecot-1:2.2.36-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot@2.2.36-10.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-mysql-1:2.2.36-10.el8.ppc64le", "product": { "name": "dovecot-mysql-1:2.2.36-10.el8.ppc64le", "product_id": "dovecot-mysql-1:2.2.36-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-mysql@2.2.36-10.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pgsql-1:2.2.36-10.el8.ppc64le", "product": { "name": "dovecot-pgsql-1:2.2.36-10.el8.ppc64le", "product_id": "dovecot-pgsql-1:2.2.36-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pgsql@2.2.36-10.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le", "product": { "name": "dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le", "product_id": "dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pigeonhole@2.2.36-10.el8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dovecot-devel-1:2.2.36-10.el8.s390x", "product": { "name": "dovecot-devel-1:2.2.36-10.el8.s390x", "product_id": "dovecot-devel-1:2.2.36-10.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-devel@2.2.36-10.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debugsource-1:2.2.36-10.el8.s390x", "product": { "name": "dovecot-debugsource-1:2.2.36-10.el8.s390x", "product_id": "dovecot-debugsource-1:2.2.36-10.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debugsource@2.2.36-10.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debuginfo-1:2.2.36-10.el8.s390x", "product": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.s390x", "product_id": "dovecot-debuginfo-1:2.2.36-10.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debuginfo@2.2.36-10.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x", "product": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x", "product_id": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-mysql-debuginfo@2.2.36-10.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x", "product": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x", "product_id": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pgsql-debuginfo@2.2.36-10.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x", "product": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x", "product_id": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pigeonhole-debuginfo@2.2.36-10.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-1:2.2.36-10.el8.s390x", "product": { "name": "dovecot-1:2.2.36-10.el8.s390x", "product_id": "dovecot-1:2.2.36-10.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot@2.2.36-10.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-mysql-1:2.2.36-10.el8.s390x", "product": { "name": "dovecot-mysql-1:2.2.36-10.el8.s390x", "product_id": "dovecot-mysql-1:2.2.36-10.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-mysql@2.2.36-10.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pgsql-1:2.2.36-10.el8.s390x", "product": { "name": "dovecot-pgsql-1:2.2.36-10.el8.s390x", "product_id": "dovecot-pgsql-1:2.2.36-10.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pgsql@2.2.36-10.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pigeonhole-1:2.2.36-10.el8.s390x", "product": { "name": "dovecot-pigeonhole-1:2.2.36-10.el8.s390x", "product_id": "dovecot-pigeonhole-1:2.2.36-10.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pigeonhole@2.2.36-10.el8?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dovecot-devel-1:2.2.36-10.el8.aarch64", "product": { "name": "dovecot-devel-1:2.2.36-10.el8.aarch64", "product_id": "dovecot-devel-1:2.2.36-10.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-devel@2.2.36-10.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debugsource-1:2.2.36-10.el8.aarch64", "product": { "name": "dovecot-debugsource-1:2.2.36-10.el8.aarch64", "product_id": "dovecot-debugsource-1:2.2.36-10.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debugsource@2.2.36-10.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-debuginfo-1:2.2.36-10.el8.aarch64", "product": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.aarch64", "product_id": "dovecot-debuginfo-1:2.2.36-10.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-debuginfo@2.2.36-10.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64", "product": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64", "product_id": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-mysql-debuginfo@2.2.36-10.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64", "product": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64", "product_id": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pgsql-debuginfo@2.2.36-10.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64", "product": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64", "product_id": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pigeonhole-debuginfo@2.2.36-10.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-1:2.2.36-10.el8.aarch64", "product": { "name": "dovecot-1:2.2.36-10.el8.aarch64", "product_id": "dovecot-1:2.2.36-10.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot@2.2.36-10.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-mysql-1:2.2.36-10.el8.aarch64", "product": { "name": "dovecot-mysql-1:2.2.36-10.el8.aarch64", "product_id": "dovecot-mysql-1:2.2.36-10.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-mysql@2.2.36-10.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pgsql-1:2.2.36-10.el8.aarch64", "product": { "name": "dovecot-pgsql-1:2.2.36-10.el8.aarch64", "product_id": "dovecot-pgsql-1:2.2.36-10.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pgsql@2.2.36-10.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "dovecot-pigeonhole-1:2.2.36-10.el8.aarch64", "product": { "name": "dovecot-pigeonhole-1:2.2.36-10.el8.aarch64", "product_id": "dovecot-pigeonhole-1:2.2.36-10.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot-pigeonhole@2.2.36-10.el8?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dovecot-1:2.2.36-10.el8.src", "product": { "name": "dovecot-1:2.2.36-10.el8.src", "product_id": "dovecot-1:2.2.36-10.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dovecot@2.2.36-10.el8?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-10.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-10.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.i686" }, "product_reference": "dovecot-1:2.2.36-10.el8.i686", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-10.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-10.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-10.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.src" }, "product_reference": "dovecot-1:2.2.36-10.el8.src", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-10.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-debuginfo-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.i686" }, "product_reference": "dovecot-debuginfo-1:2.2.36-10.el8.i686", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-debuginfo-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-debuginfo-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-debuginfo-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debugsource-1:2.2.36-10.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-debugsource-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debugsource-1:2.2.36-10.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.i686" }, "product_reference": "dovecot-debugsource-1:2.2.36-10.el8.i686", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debugsource-1:2.2.36-10.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-debugsource-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debugsource-1:2.2.36-10.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-debugsource-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debugsource-1:2.2.36-10.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-debugsource-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-10.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-devel-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-10.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.i686" }, "product_reference": "dovecot-devel-1:2.2.36-10.el8.i686", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-10.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-devel-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-10.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-devel-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-10.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-devel-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-10.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-mysql-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-10.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-mysql-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-10.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-mysql-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-10.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-mysql-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686" }, "product_reference": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-10.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-pgsql-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-10.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-pgsql-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-10.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-pgsql-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-10.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-pgsql-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686" }, "product_reference": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-10.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-10.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-10.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686" }, "product_reference": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "AppStream-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-10.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-10.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-1:2.2.36-10.el8.i686" }, "product_reference": "dovecot-1:2.2.36-10.el8.i686", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-10.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-10.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-10.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-1:2.2.36-10.el8.src" }, "product_reference": "dovecot-1:2.2.36-10.el8.src", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-1:2.2.36-10.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-debuginfo-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.i686" }, "product_reference": "dovecot-debuginfo-1:2.2.36-10.el8.i686", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-debuginfo-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-debuginfo-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debuginfo-1:2.2.36-10.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-debuginfo-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debugsource-1:2.2.36-10.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-debugsource-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debugsource-1:2.2.36-10.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.i686" }, "product_reference": "dovecot-debugsource-1:2.2.36-10.el8.i686", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debugsource-1:2.2.36-10.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-debugsource-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debugsource-1:2.2.36-10.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-debugsource-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-debugsource-1:2.2.36-10.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-debugsource-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-10.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-devel-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-10.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.i686" }, "product_reference": "dovecot-devel-1:2.2.36-10.el8.i686", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-10.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-devel-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-10.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-devel-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-devel-1:2.2.36-10.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-devel-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-10.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-mysql-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-10.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-mysql-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-10.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-mysql-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-1:2.2.36-10.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-mysql-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686" }, "product_reference": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-10.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-pgsql-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-10.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-pgsql-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-10.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-pgsql-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-1:2.2.36-10.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-pgsql-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686" }, "product_reference": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-10.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-10.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-1:2.2.36-10.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-pigeonhole-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64" }, "product_reference": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686" }, "product_reference": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le" }, "product_reference": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x" }, "product_reference": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64" }, "product_reference": "dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3814", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2019-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1673415" } ], "notes": [ { "category": "description", "text": "It was discovered that Dovecot incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.", "title": "Vulnerability description" }, { "category": "summary", "text": "dovecot: Improper certificate validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.src", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.src", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3814" }, { "category": "external", "summary": "RHBZ#1673415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1673415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3814", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3814" }, { "category": "external", "summary": "https://www.dovecot.org/list/dovecot/2019-February/114575.html", "url": "https://www.dovecot.org/list/dovecot/2019-February/114575.html" } ], "release_date": "2019-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T21:29:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.src", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.src", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3467" }, { "category": "workaround", "details": "Attack can be migitated by having the certificates with proper Extended Key Usage, such as \u0027TLS Web Server\u0027 and \u0027TLS Web Server Client\u0027. Also client-side certification authentication can be turned off using:\nauth_ssl_require_client_cert = no\nauth_ssl_username_from_cert = no", "product_ids": [ "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.src", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.src", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "products": [ "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.src", "AppStream-8.1.0:dovecot-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-devel-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-mysql-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.x86_64", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x", "AppStream-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.src", "CRB-8.1.0:dovecot-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-debugsource-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-devel-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-mysql-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-mysql-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pgsql-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pgsql-debuginfo-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pigeonhole-1:2.2.36-10.el8.x86_64", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.aarch64", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.i686", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.ppc64le", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.s390x", "CRB-8.1.0:dovecot-pigeonhole-debuginfo-1:2.2.36-10.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "dovecot: Improper certificate validation" } ] }
suse-su-2019:0900-1
Vulnerability from csaf_suse
Published
2019-04-08 09:12
Modified
2019-04-08 09:12
Summary
Security update for dovecot22
Notes
Title of the patch
Security update for dovecot22
Description of the patch
This update for dovecot22 fixes the following issues:
Security issues fixed:
- CVE-2019-7524: Fixed an improper file handling which could result in stack overflow allowing
local root escalation (bsc#1130116).
- CVE-2019-3814: Fixed a vulnerability related to SSL client certificate authentication (bsc#1123022).
Other issue fixed:
- Fixed handling of command continuation(bsc#1111789)
Patchnames
SUSE-2019-900,SUSE-OpenStack-Cloud-7-2019-900,SUSE-SLE-SAP-12-SP1-2019-900,SUSE-SLE-SAP-12-SP2-2019-900,SUSE-SLE-SDK-12-SP3-2019-900,SUSE-SLE-SDK-12-SP4-2019-900,SUSE-SLE-SERVER-12-2019-900,SUSE-SLE-SERVER-12-SP1-2019-900,SUSE-SLE-SERVER-12-SP2-2019-900,SUSE-SLE-SERVER-12-SP2-BCL-2019-900,SUSE-SLE-SERVER-12-SP3-2019-900,SUSE-SLE-SERVER-12-SP4-2019-900,SUSE-Storage-4-2019-900
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dovecot22", "title": "Title of the patch" }, { "category": "description", "text": "This update for dovecot22 fixes the following issues:\n\nSecurity issues fixed: \n\n- CVE-2019-7524: Fixed an improper file handling which could result in stack overflow allowing \n local root escalation (bsc#1130116).\n- CVE-2019-3814: Fixed a vulnerability related to SSL client certificate authentication (bsc#1123022).\n\nOther issue fixed: \n- Fixed handling of command continuation(bsc#1111789)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-900,SUSE-OpenStack-Cloud-7-2019-900,SUSE-SLE-SAP-12-SP1-2019-900,SUSE-SLE-SAP-12-SP2-2019-900,SUSE-SLE-SDK-12-SP3-2019-900,SUSE-SLE-SDK-12-SP4-2019-900,SUSE-SLE-SERVER-12-2019-900,SUSE-SLE-SERVER-12-SP1-2019-900,SUSE-SLE-SERVER-12-SP2-2019-900,SUSE-SLE-SERVER-12-SP2-BCL-2019-900,SUSE-SLE-SERVER-12-SP3-2019-900,SUSE-SLE-SERVER-12-SP4-2019-900,SUSE-Storage-4-2019-900", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0900-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0900-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190900-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0900-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005310.html" }, { "category": "self", "summary": "SUSE Bug 1111789", "url": "https://bugzilla.suse.com/1111789" }, { "category": "self", "summary": "SUSE Bug 1123022", "url": "https://bugzilla.suse.com/1123022" }, { "category": "self", "summary": "SUSE Bug 1130116", "url": "https://bugzilla.suse.com/1130116" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3814 page", "url": "https://www.suse.com/security/cve/CVE-2019-3814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7524 page", "url": "https://www.suse.com/security/cve/CVE-2019-7524/" } ], "title": "Security update for dovecot22", "tracking": { "current_release_date": "2019-04-08T09:12:11Z", "generator": { "date": "2019-04-08T09:12:11Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0900-1", "initial_release_date": "2019-04-08T09:12:11Z", "revision_history": [ { "date": "2019-04-08T09:12:11Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dovecot22-2.2.31-19.14.2.aarch64", "product": { "name": "dovecot22-2.2.31-19.14.2.aarch64", "product_id": "dovecot22-2.2.31-19.14.2.aarch64" } }, { "category": "product_version", "name": "dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "product": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "product_id": "dovecot22-backend-mysql-2.2.31-19.14.2.aarch64" } }, { "category": "product_version", "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "product": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "product_id": "dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64" } }, { "category": "product_version", "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "product": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "product_id": "dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64" } }, { "category": "product_version", "name": "dovecot22-devel-2.2.31-19.14.2.aarch64", "product": { "name": "dovecot22-devel-2.2.31-19.14.2.aarch64", "product_id": "dovecot22-devel-2.2.31-19.14.2.aarch64" } }, { "category": "product_version", "name": "dovecot22-fts-2.2.31-19.14.2.aarch64", "product": { "name": "dovecot22-fts-2.2.31-19.14.2.aarch64", "product_id": "dovecot22-fts-2.2.31-19.14.2.aarch64" } }, { "category": "product_version", "name": "dovecot22-fts-lucene-2.2.31-19.14.2.aarch64", "product": { "name": "dovecot22-fts-lucene-2.2.31-19.14.2.aarch64", "product_id": "dovecot22-fts-lucene-2.2.31-19.14.2.aarch64" } }, { "category": "product_version", "name": "dovecot22-fts-solr-2.2.31-19.14.2.aarch64", "product": { "name": "dovecot22-fts-solr-2.2.31-19.14.2.aarch64", "product_id": "dovecot22-fts-solr-2.2.31-19.14.2.aarch64" } }, { "category": "product_version", "name": "dovecot22-fts-squat-2.2.31-19.14.2.aarch64", "product": { "name": "dovecot22-fts-squat-2.2.31-19.14.2.aarch64", "product_id": "dovecot22-fts-squat-2.2.31-19.14.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dovecot22-2.2.31-19.14.2.i586", "product": { "name": "dovecot22-2.2.31-19.14.2.i586", "product_id": "dovecot22-2.2.31-19.14.2.i586" } }, { "category": "product_version", "name": "dovecot22-backend-mysql-2.2.31-19.14.2.i586", "product": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.i586", "product_id": "dovecot22-backend-mysql-2.2.31-19.14.2.i586" } }, { "category": "product_version", "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.i586", "product": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.i586", "product_id": "dovecot22-backend-pgsql-2.2.31-19.14.2.i586" } }, { "category": "product_version", "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.i586", "product": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.i586", "product_id": "dovecot22-backend-sqlite-2.2.31-19.14.2.i586" } }, { "category": "product_version", "name": "dovecot22-devel-2.2.31-19.14.2.i586", "product": { "name": "dovecot22-devel-2.2.31-19.14.2.i586", "product_id": "dovecot22-devel-2.2.31-19.14.2.i586" } }, { "category": "product_version", "name": "dovecot22-fts-2.2.31-19.14.2.i586", "product": { "name": "dovecot22-fts-2.2.31-19.14.2.i586", "product_id": "dovecot22-fts-2.2.31-19.14.2.i586" } }, { "category": "product_version", "name": "dovecot22-fts-lucene-2.2.31-19.14.2.i586", "product": { "name": "dovecot22-fts-lucene-2.2.31-19.14.2.i586", "product_id": "dovecot22-fts-lucene-2.2.31-19.14.2.i586" } }, { "category": "product_version", "name": "dovecot22-fts-solr-2.2.31-19.14.2.i586", "product": { "name": "dovecot22-fts-solr-2.2.31-19.14.2.i586", "product_id": "dovecot22-fts-solr-2.2.31-19.14.2.i586" } }, { "category": "product_version", "name": "dovecot22-fts-squat-2.2.31-19.14.2.i586", "product": { "name": "dovecot22-fts-squat-2.2.31-19.14.2.i586", "product_id": "dovecot22-fts-squat-2.2.31-19.14.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "dovecot22-2.2.31-19.14.2.ppc64le", "product": { "name": "dovecot22-2.2.31-19.14.2.ppc64le", "product_id": "dovecot22-2.2.31-19.14.2.ppc64le" } }, { "category": "product_version", "name": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "product": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "product_id": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le" } }, { "category": "product_version", "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "product": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "product_id": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le" } }, { "category": "product_version", "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "product": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "product_id": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le" } }, { "category": "product_version", "name": "dovecot22-devel-2.2.31-19.14.2.ppc64le", "product": { "name": "dovecot22-devel-2.2.31-19.14.2.ppc64le", "product_id": "dovecot22-devel-2.2.31-19.14.2.ppc64le" } }, { "category": "product_version", "name": "dovecot22-fts-2.2.31-19.14.2.ppc64le", "product": { "name": "dovecot22-fts-2.2.31-19.14.2.ppc64le", "product_id": "dovecot22-fts-2.2.31-19.14.2.ppc64le" } }, { "category": "product_version", "name": "dovecot22-fts-lucene-2.2.31-19.14.2.ppc64le", "product": { "name": "dovecot22-fts-lucene-2.2.31-19.14.2.ppc64le", "product_id": "dovecot22-fts-lucene-2.2.31-19.14.2.ppc64le" } }, { "category": "product_version", "name": "dovecot22-fts-solr-2.2.31-19.14.2.ppc64le", "product": { "name": "dovecot22-fts-solr-2.2.31-19.14.2.ppc64le", "product_id": "dovecot22-fts-solr-2.2.31-19.14.2.ppc64le" } }, { "category": "product_version", "name": "dovecot22-fts-squat-2.2.31-19.14.2.ppc64le", "product": { "name": "dovecot22-fts-squat-2.2.31-19.14.2.ppc64le", "product_id": "dovecot22-fts-squat-2.2.31-19.14.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dovecot22-2.2.31-19.14.2.s390", "product": { "name": "dovecot22-2.2.31-19.14.2.s390", "product_id": "dovecot22-2.2.31-19.14.2.s390" } }, { "category": "product_version", "name": "dovecot22-backend-mysql-2.2.31-19.14.2.s390", "product": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.s390", "product_id": "dovecot22-backend-mysql-2.2.31-19.14.2.s390" } }, { "category": "product_version", "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390", "product": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390", "product_id": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390" } }, { "category": "product_version", "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390", "product": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390", "product_id": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390" } }, { "category": "product_version", "name": "dovecot22-devel-2.2.31-19.14.2.s390", "product": { "name": "dovecot22-devel-2.2.31-19.14.2.s390", "product_id": "dovecot22-devel-2.2.31-19.14.2.s390" } }, { "category": "product_version", "name": "dovecot22-fts-2.2.31-19.14.2.s390", "product": { "name": "dovecot22-fts-2.2.31-19.14.2.s390", "product_id": "dovecot22-fts-2.2.31-19.14.2.s390" } }, { "category": "product_version", "name": "dovecot22-fts-lucene-2.2.31-19.14.2.s390", "product": { "name": "dovecot22-fts-lucene-2.2.31-19.14.2.s390", "product_id": "dovecot22-fts-lucene-2.2.31-19.14.2.s390" } }, { "category": "product_version", "name": "dovecot22-fts-solr-2.2.31-19.14.2.s390", "product": { "name": "dovecot22-fts-solr-2.2.31-19.14.2.s390", "product_id": "dovecot22-fts-solr-2.2.31-19.14.2.s390" } }, { "category": "product_version", "name": "dovecot22-fts-squat-2.2.31-19.14.2.s390", "product": { "name": "dovecot22-fts-squat-2.2.31-19.14.2.s390", "product_id": "dovecot22-fts-squat-2.2.31-19.14.2.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "dovecot22-2.2.31-19.14.2.s390x", "product": { "name": "dovecot22-2.2.31-19.14.2.s390x", "product_id": "dovecot22-2.2.31-19.14.2.s390x" } }, { "category": "product_version", "name": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "product": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "product_id": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x" } }, { "category": "product_version", "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "product": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "product_id": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x" } }, { "category": "product_version", "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "product": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "product_id": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x" } }, { "category": "product_version", "name": "dovecot22-devel-2.2.31-19.14.2.s390x", "product": { "name": "dovecot22-devel-2.2.31-19.14.2.s390x", "product_id": "dovecot22-devel-2.2.31-19.14.2.s390x" } }, { "category": "product_version", "name": "dovecot22-fts-2.2.31-19.14.2.s390x", "product": { "name": "dovecot22-fts-2.2.31-19.14.2.s390x", "product_id": "dovecot22-fts-2.2.31-19.14.2.s390x" } }, { "category": "product_version", "name": "dovecot22-fts-lucene-2.2.31-19.14.2.s390x", "product": { "name": "dovecot22-fts-lucene-2.2.31-19.14.2.s390x", "product_id": "dovecot22-fts-lucene-2.2.31-19.14.2.s390x" } }, { "category": "product_version", "name": "dovecot22-fts-solr-2.2.31-19.14.2.s390x", "product": { "name": "dovecot22-fts-solr-2.2.31-19.14.2.s390x", "product_id": "dovecot22-fts-solr-2.2.31-19.14.2.s390x" } }, { "category": "product_version", "name": "dovecot22-fts-squat-2.2.31-19.14.2.s390x", "product": { "name": "dovecot22-fts-squat-2.2.31-19.14.2.s390x", "product_id": "dovecot22-fts-squat-2.2.31-19.14.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dovecot22-2.2.31-19.14.2.x86_64", "product": { "name": "dovecot22-2.2.31-19.14.2.x86_64", "product_id": "dovecot22-2.2.31-19.14.2.x86_64" } }, { "category": "product_version", "name": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "product": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "product_id": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64" } }, { "category": "product_version", "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "product": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "product_id": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64" } }, { "category": "product_version", "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "product": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "product_id": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" } }, { "category": "product_version", "name": "dovecot22-devel-2.2.31-19.14.2.x86_64", "product": { "name": "dovecot22-devel-2.2.31-19.14.2.x86_64", "product_id": "dovecot22-devel-2.2.31-19.14.2.x86_64" } }, { "category": "product_version", "name": "dovecot22-fts-2.2.31-19.14.2.x86_64", "product": { "name": "dovecot22-fts-2.2.31-19.14.2.x86_64", "product_id": "dovecot22-fts-2.2.31-19.14.2.x86_64" } }, { "category": "product_version", "name": "dovecot22-fts-lucene-2.2.31-19.14.2.x86_64", "product": { "name": "dovecot22-fts-lucene-2.2.31-19.14.2.x86_64", "product_id": "dovecot22-fts-lucene-2.2.31-19.14.2.x86_64" } }, { "category": "product_version", "name": "dovecot22-fts-solr-2.2.31-19.14.2.x86_64", "product": { "name": "dovecot22-fts-solr-2.2.31-19.14.2.x86_64", "product_id": "dovecot22-fts-solr-2.2.31-19.14.2.x86_64" } }, { "category": "product_version", "name": "dovecot22-fts-squat-2.2.31-19.14.2.x86_64", "product": { "name": "dovecot22-fts-squat-2.2.31-19.14.2.x86_64", "product_id": "dovecot22-fts-squat-2.2.31-19.14.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:dovecot22-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:dovecot22-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:dovecot22-backend-mysql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-devel-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-devel-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-devel-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-devel-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-devel-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-devel-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-devel-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-devel-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-devel-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-devel-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-devel-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-devel-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-devel-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-devel-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-devel-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-devel-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-2.2.31-19.14.2.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:dovecot22-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" }, "product_reference": "dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3814" } ], "notes": [ { "category": "general", "text": "It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3814", "url": "https://www.suse.com/security/cve/CVE-2019-3814" }, { "category": "external", "summary": "SUSE Bug 1123022 for CVE-2019-3814", "url": "https://bugzilla.suse.com/1123022" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:12:11Z", "details": "important" } ], "title": "CVE-2019-3814" }, { "cve": "CVE-2019-7524", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7524" } ], "notes": [ { "category": "general", "text": "In Dovecot before 2.2.36.3 and 2.3.x before 2.3.5.1, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7524", "url": "https://www.suse.com/security/cve/CVE-2019-7524" }, { "category": "external", "summary": "SUSE Bug 1130116 for CVE-2019-7524", "url": "https://bugzilla.suse.com/1130116" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Enterprise Storage 4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server 12-LTSS:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:dovecot22-devel-2.2.31-19.14.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:dovecot22-devel-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-mysql-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-mysql-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-pgsql-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-pgsql-2.2.31-19.14.2.x86_64", "SUSE OpenStack Cloud 7:dovecot22-backend-sqlite-2.2.31-19.14.2.s390x", "SUSE OpenStack Cloud 7:dovecot22-backend-sqlite-2.2.31-19.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:12:11Z", "details": "moderate" } ], "title": "CVE-2019-7524" } ] }
suse-su-2019:0414-1
Vulnerability from csaf_suse
Published
2019-02-15 06:04
Modified
2019-02-15 06:04
Summary
Security update for dovecot23
Notes
Title of the patch
Security update for dovecot23
Description of the patch
This update for dovecot23 fixes the following issues:
dovecot was updated to 2.3.3 release, bringing lots of bugfixes (bsc#1124356).
Also the following security issue was fixed:
- CVE-2019-3814: A vulnerability in Dovecot related to SSL client certificate authentication was fixed (bsc#1123022)
The package changes:
Updated pigeonhole to 0.5.3:
- Fix assertion panic occurring when managesieve service fails to
open INBOX while saving a Sieve script. This was caused by a
lack of cleanup after failure.
- Fix specific messages causing an assert panic with actions that
compose a reply (e.g. vacation). With some rather weird input
from the original message, the header folding algorithm (as
used for composing the References header for the reply) got
confused, causing the panic.
- IMAP FILTER=SIEVE capability: Fix FILTER SIEVE SCRIPT command
parsing. After finishing reading the Sieve script, the command
parsing sometimes didn't continue with the search arguments.
This is a time- critical bug that likely only occurs when the
Sieve script is sent in the next TCP frame.
dovecot23 was updated to 2.3.3:
- doveconf hides more secrets now in the default output.
- ssl_dh setting is no longer enforced at startup. If it's not
set and non-ECC DH key exchange happens, error is logged and
client is disconnected.
- Added log_debug=<filter> setting.
- Added log_core_filter=<log filter> setting.
- quota-clone: Write to dict asynchronously
- --enable-hardening attempts to use retpoline Spectre 2
mitigations
- lmtp proxy: Support source_ip passdb extra field.
- doveadm stats dump: Support more fields and output stddev
by default.
- push-notification: Add SSL support for OX backend.
- NUL bytes in mail headers can cause truncated replies when fetched.
- director: Conflicting host up/down state changes may in some
rare situations ended up in a loop of two directors constantly
overwriting each others' changes.
- director: Fix hang/crash when multiple doveadm commands are
being handled concurrently.
- director: Fix assert-crash if doveadm disconnects too early
- virtual plugin: Some searches used 100% CPU for many seconds
- dsync assert-crashed with acl plugin in some situations. (bsc#1119850)
- mail_attachment_detection_options=add-flags-on-save
assert-crashed with some specific Sieve scripts.
- Mail snippet generation crashed with mails containing invalid
Content-Type:multipart header.
- Log prefix ordering was different for some log lines.
- quota: With noenforcing option current quota usage wasn't
updated.
- auth: Kerberos authentication against Samba assert-crashed.
- stats clients were unnecessarily chatty with the stats server.
- imapc: Fixed various assert-crashes when reconnecting to
server.
- lmtp, submission: Fix potential crash if client disconnects
while handling a command.
- quota: Fixed compiling with glibc-2.26 / support libtirpc.
- fts-solr: Empty search values resulted in 400 Bad Request
errors
- fts-solr: default_ns parameter couldn't be used
- submission server crashed if relay server returned over 7 lines
in a reply (e.g. to EHLO)
dovecot was updated to 2.3.2.1:
- SSL/TLS servers may have crashed during client disconnection
- lmtp: With lmtp_rcpt_check_quota=yes mail deliveries may have
sometimes assert-crashed.
- v2.3.2: 'make check' may have crashed with 32bit systems
dovecot was updated to 2.3.2:
- old-stats plugin: Don't temporarily enable PR_SET_DUMPABLE
while opening /proc/self/io. This may still cause security
problems if the process is ptrace()d at the same time.
Instead, open it while still running as root.
- doveadm: Added mailbox cache decision&remove commands. See
doveadm-mailbox(1) man page for details.
- doveadm: Added rebuild attachments command for rebuilding
$HasAttachment or $HasNoAttachment flags for matching mails.
See doveadm-rebuild(1) man page for details.
- cassandra: Use fallback_consistency on more types of errors
- lmtp proxy: Support outgoing SSL/TLS connections
- lmtp: Add lmtp_rawlog_dir and lmtp_proxy_rawlog_dir settings.
- submission: Add support for rawlog_dir
- submission: Add submission_client_workarounds setting.
- lua auth: Add password_verify() function and additional fields
in auth request.
- doveadm-server: TCP connections are hanging when there is a lot
of network output. This especially caused hangs in
dsync-replication.
- Using multiple type=shared mdbox namespaces crashed
- mail_fsync setting was ignored. It was always set to
'optimized'.
- lua auth: Fix potential crash at deinit
- SSL/TLS servers may have crashed if client disconnected during
handshake.
- SSL/TLS servers: Don't send extraneous certificates to client
when alt certs are used.
- lda, lmtp: Return-Path header without '<' may have
assert-crashed.
- lda, lmtp: Unencoded UTF-8 in email address headers may
assert-crash
- lda: -f parameter didn't allow empty/null/domainless address
- lmtp, submission: Message size limit was hardcoded to 40 MB.
Exceeding it caused the connection to get dropped during
transfer.
- lmtp: Fix potential crash when delivery fails at DATA stage
- lmtp: login_greeting setting was ignored
- Fix to work with OpenSSL v1.0.2f
- systemd unit restrictions were too strict by default
- Fix potential crashes when a lot of log output was produced
- SMTP client may have assert-crashed when sending mail
- IMAP COMPRESS: Send 'end of compression' marker when
disconnecting.
- cassandra: Fix consistency=quorum to work
- dsync: Lock file generation failed if home directory didn't
exist
- Snippet generation for HTML mails didn't ignore &entities
inside blockquotes, producing strange looking snippets.
- imapc: Fix assert-crash if getting disconnected and after
reconnection all mails in the selected mailbox are gone.
- pop3c: Handle unexpected server disconnections without
assert-crash
- fts: Fixes to indexing mails via virtual mailboxes.
- fts: If mails contained NUL characters, the text around it
wasn't indexed.
- Obsolete dovecot.index.cache offsets were sometimes used.
Trying to fetch a field that was just added to cache file may
not have always found it.
pigeonhole was updated to 0.5.2:
- Implement plugin for the a vendor-defined IMAP capability
called 'FILTER=SIEVE'. It adds the ability to manually invoke
Sieve filtering in IMAP. More information can be found in
doc/plugins/imap_filter_sieve.txt.
- The Sieve addess test caused an assertion panic for invalid
addresses with UTF-8 codepoints in the localpart. Fixed by
properly detecting invalid addresses with UTF-8 codepoints in
the localpart and skipping these like other invalid addresses
while iterating addresses for the address test.
- Make the length of the subject header for the vacation response
configurable and enforce the limit in UTF-8 codepoints rather
than bytes. The subject header for a vacation response was
statically truncated to 256 bytes, which is too limited for
multi-byte UTF-8 characters.
- Sieve editheader extension: Fix assertion panic occurring when
it is used to manipulate a message header with a very large
header field.
- Properly abort execution of the sieve_discard script upon
error. Before, the LDA Sieve plugin attempted to execute the
sieve_discard script when an error occurs. This can lead to the
message being lost.
- Fix the interaction between quota and the sieve_discard script.
When quota was used together with a sieve_discard script, the
message delivery did not bounce when the quota was exceeded.
- Fix crash for over quota users
Patchnames
SUSE-2019-414,SUSE-SLE-Module-Server-Applications-15-2019-414
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dovecot23", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for dovecot23 fixes the following issues:\n\ndovecot was updated to 2.3.3 release, bringing lots of bugfixes (bsc#1124356).\n\nAlso the following security issue was fixed:\n\n- CVE-2019-3814: A vulnerability in Dovecot related to SSL client certificate authentication was fixed (bsc#1123022)\n\nThe package changes:\n\nUpdated pigeonhole to 0.5.3:\n\n- Fix assertion panic occurring when managesieve service fails to\n open INBOX while saving a Sieve script. This was caused by a\n lack of cleanup after failure.\n- Fix specific messages causing an assert panic with actions that\n compose a reply (e.g. vacation). With some rather weird input\n from the original message, the header folding algorithm (as\n used for composing the References header for the reply) got\n confused, causing the panic.\n- IMAP FILTER=SIEVE capability: Fix FILTER SIEVE SCRIPT command\n parsing. After finishing reading the Sieve script, the command\n parsing sometimes didn\u0027t continue with the search arguments.\n This is a time- critical bug that likely only occurs when the\n Sieve script is sent in the next TCP frame.\n\ndovecot23 was updated to 2.3.3:\n\n- doveconf hides more secrets now in the default output.\n- ssl_dh setting is no longer enforced at startup. If it\u0027s not\n set and non-ECC DH key exchange happens, error is logged and\n client is disconnected.\n- Added log_debug=\u003cfilter\u003e setting.\n- Added log_core_filter=\u003clog filter\u003e setting.\n- quota-clone: Write to dict asynchronously\n- --enable-hardening attempts to use retpoline Spectre 2\n mitigations\n- lmtp proxy: Support source_ip passdb extra field.\n- doveadm stats dump: Support more fields and output stddev\n by default.\n- push-notification: Add SSL support for OX backend.\n- NUL bytes in mail headers can cause truncated replies when fetched.\n- director: Conflicting host up/down state changes may in some\n rare situations ended up in a loop of two directors constantly\n overwriting each others\u0027 changes.\n- director: Fix hang/crash when multiple doveadm commands are\n being handled concurrently.\n- director: Fix assert-crash if doveadm disconnects too early\n- virtual plugin: Some searches used 100% CPU for many seconds\n- dsync assert-crashed with acl plugin in some situations. (bsc#1119850)\n- mail_attachment_detection_options=add-flags-on-save\n assert-crashed with some specific Sieve scripts.\n- Mail snippet generation crashed with mails containing invalid\n Content-Type:multipart header.\n- Log prefix ordering was different for some log lines.\n- quota: With noenforcing option current quota usage wasn\u0027t\n updated.\n- auth: Kerberos authentication against Samba assert-crashed.\n- stats clients were unnecessarily chatty with the stats server.\n- imapc: Fixed various assert-crashes when reconnecting to\n server.\n- lmtp, submission: Fix potential crash if client disconnects\n while handling a command.\n- quota: Fixed compiling with glibc-2.26 / support libtirpc.\n- fts-solr: Empty search values resulted in 400 Bad Request\n errors\n- fts-solr: default_ns parameter couldn\u0027t be used\n- submission server crashed if relay server returned over 7 lines\n in a reply (e.g. to EHLO)\n\ndovecot was updated to 2.3.2.1:\n\n- SSL/TLS servers may have crashed during client disconnection\n- lmtp: With lmtp_rcpt_check_quota=yes mail deliveries may have\n sometimes assert-crashed.\n- v2.3.2: \u0027make check\u0027 may have crashed with 32bit systems\n\ndovecot was updated to 2.3.2:\n\n- old-stats plugin: Don\u0027t temporarily enable PR_SET_DUMPABLE\n while opening /proc/self/io. This may still cause security\n problems if the process is ptrace()d at the same time.\n Instead, open it while still running as root.\n- doveadm: Added mailbox cache decision\u0026remove commands. See\n doveadm-mailbox(1) man page for details.\n- doveadm: Added rebuild attachments command for rebuilding\n $HasAttachment or $HasNoAttachment flags for matching mails.\n See doveadm-rebuild(1) man page for details.\n- cassandra: Use fallback_consistency on more types of errors\n- lmtp proxy: Support outgoing SSL/TLS connections\n- lmtp: Add lmtp_rawlog_dir and lmtp_proxy_rawlog_dir settings.\n- submission: Add support for rawlog_dir\n- submission: Add submission_client_workarounds setting.\n- lua auth: Add password_verify() function and additional fields\n in auth request.\n- doveadm-server: TCP connections are hanging when there is a lot\n of network output. This especially caused hangs in\n dsync-replication.\n- Using multiple type=shared mdbox namespaces crashed\n- mail_fsync setting was ignored. It was always set to\n \u0027optimized\u0027.\n- lua auth: Fix potential crash at deinit\n- SSL/TLS servers may have crashed if client disconnected during\n handshake.\n- SSL/TLS servers: Don\u0027t send extraneous certificates to client\n when alt certs are used.\n- lda, lmtp: Return-Path header without \u0027\u003c\u0027 may have\n assert-crashed.\n- lda, lmtp: Unencoded UTF-8 in email address headers may\n assert-crash\n- lda: -f parameter didn\u0027t allow empty/null/domainless address\n- lmtp, submission: Message size limit was hardcoded to 40 MB.\n Exceeding it caused the connection to get dropped during\n transfer.\n- lmtp: Fix potential crash when delivery fails at DATA stage\n- lmtp: login_greeting setting was ignored\n- Fix to work with OpenSSL v1.0.2f\n- systemd unit restrictions were too strict by default\n- Fix potential crashes when a lot of log output was produced\n- SMTP client may have assert-crashed when sending mail\n- IMAP COMPRESS: Send \u0027end of compression\u0027 marker when\n disconnecting.\n- cassandra: Fix consistency=quorum to work\n- dsync: Lock file generation failed if home directory didn\u0027t\n exist\n- Snippet generation for HTML mails didn\u0027t ignore \u0026entities\n inside blockquotes, producing strange looking snippets.\n- imapc: Fix assert-crash if getting disconnected and after\n reconnection all mails in the selected mailbox are gone.\n- pop3c: Handle unexpected server disconnections without\n assert-crash\n- fts: Fixes to indexing mails via virtual mailboxes.\n- fts: If mails contained NUL characters, the text around it\n wasn\u0027t indexed.\n- Obsolete dovecot.index.cache offsets were sometimes used.\n Trying to fetch a field that was just added to cache file may\n not have always found it.\n\npigeonhole was updated to 0.5.2:\n\n- Implement plugin for the a vendor-defined IMAP capability\n called \u0027FILTER=SIEVE\u0027. It adds the ability to manually invoke\n Sieve filtering in IMAP. More information can be found in\n doc/plugins/imap_filter_sieve.txt.\n- The Sieve addess test caused an assertion panic for invalid\n addresses with UTF-8 codepoints in the localpart. Fixed by\n properly detecting invalid addresses with UTF-8 codepoints in\n the localpart and skipping these like other invalid addresses\n while iterating addresses for the address test.\n- Make the length of the subject header for the vacation response\n configurable and enforce the limit in UTF-8 codepoints rather\n than bytes. The subject header for a vacation response was\n statically truncated to 256 bytes, which is too limited for\n multi-byte UTF-8 characters.\n- Sieve editheader extension: Fix assertion panic occurring when\n it is used to manipulate a message header with a very large\n header field.\n- Properly abort execution of the sieve_discard script upon\n error. Before, the LDA Sieve plugin attempted to execute the\n sieve_discard script when an error occurs. This can lead to the\n message being lost.\n- Fix the interaction between quota and the sieve_discard script.\n When quota was used together with a sieve_discard script, the\n message delivery did not bounce when the quota was exceeded.\n- Fix crash for over quota users\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-414,SUSE-SLE-Module-Server-Applications-15-2019-414", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0414-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0414-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190414-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0414-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-February/005124.html" }, { "category": "self", "summary": "SUSE Bug 1119850", "url": "https://bugzilla.suse.com/1119850" }, { "category": "self", "summary": "SUSE Bug 1123022", "url": "https://bugzilla.suse.com/1123022" }, { "category": "self", "summary": "SUSE Bug 1124356", "url": "https://bugzilla.suse.com/1124356" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3814 page", "url": "https://www.suse.com/security/cve/CVE-2019-3814/" } ], "title": "Security update for dovecot23", "tracking": { "current_release_date": "2019-02-15T06:04:40Z", "generator": { "date": "2019-02-15T06:04:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0414-1", "initial_release_date": "2019-02-15T06:04:40Z", "revision_history": [ { "date": "2019-02-15T06:04:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dovecot23-2.3.3-4.7.4.aarch64", "product": { "name": "dovecot23-2.3.3-4.7.4.aarch64", "product_id": "dovecot23-2.3.3-4.7.4.aarch64" } }, { "category": "product_version", "name": "dovecot23-backend-mysql-2.3.3-4.7.4.aarch64", "product": { "name": "dovecot23-backend-mysql-2.3.3-4.7.4.aarch64", "product_id": "dovecot23-backend-mysql-2.3.3-4.7.4.aarch64" } }, { "category": "product_version", "name": "dovecot23-backend-pgsql-2.3.3-4.7.4.aarch64", "product": { "name": "dovecot23-backend-pgsql-2.3.3-4.7.4.aarch64", "product_id": "dovecot23-backend-pgsql-2.3.3-4.7.4.aarch64" } }, { "category": "product_version", "name": "dovecot23-backend-sqlite-2.3.3-4.7.4.aarch64", "product": { "name": "dovecot23-backend-sqlite-2.3.3-4.7.4.aarch64", "product_id": "dovecot23-backend-sqlite-2.3.3-4.7.4.aarch64" } }, { "category": "product_version", "name": "dovecot23-devel-2.3.3-4.7.4.aarch64", "product": { "name": "dovecot23-devel-2.3.3-4.7.4.aarch64", "product_id": "dovecot23-devel-2.3.3-4.7.4.aarch64" } }, { "category": "product_version", "name": "dovecot23-fts-2.3.3-4.7.4.aarch64", "product": { "name": "dovecot23-fts-2.3.3-4.7.4.aarch64", "product_id": "dovecot23-fts-2.3.3-4.7.4.aarch64" } }, { "category": "product_version", "name": "dovecot23-fts-lucene-2.3.3-4.7.4.aarch64", "product": { "name": "dovecot23-fts-lucene-2.3.3-4.7.4.aarch64", "product_id": "dovecot23-fts-lucene-2.3.3-4.7.4.aarch64" } }, { "category": "product_version", "name": "dovecot23-fts-solr-2.3.3-4.7.4.aarch64", "product": { "name": "dovecot23-fts-solr-2.3.3-4.7.4.aarch64", "product_id": "dovecot23-fts-solr-2.3.3-4.7.4.aarch64" } }, { "category": "product_version", "name": "dovecot23-fts-squat-2.3.3-4.7.4.aarch64", "product": { "name": "dovecot23-fts-squat-2.3.3-4.7.4.aarch64", "product_id": "dovecot23-fts-squat-2.3.3-4.7.4.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "dovecot23-2.3.3-4.7.4.i586", "product": { "name": "dovecot23-2.3.3-4.7.4.i586", "product_id": "dovecot23-2.3.3-4.7.4.i586" } }, { "category": "product_version", "name": "dovecot23-backend-mysql-2.3.3-4.7.4.i586", "product": { "name": "dovecot23-backend-mysql-2.3.3-4.7.4.i586", "product_id": "dovecot23-backend-mysql-2.3.3-4.7.4.i586" } }, { "category": "product_version", "name": "dovecot23-backend-pgsql-2.3.3-4.7.4.i586", "product": { "name": "dovecot23-backend-pgsql-2.3.3-4.7.4.i586", "product_id": "dovecot23-backend-pgsql-2.3.3-4.7.4.i586" } }, { "category": "product_version", "name": "dovecot23-backend-sqlite-2.3.3-4.7.4.i586", "product": { "name": "dovecot23-backend-sqlite-2.3.3-4.7.4.i586", "product_id": "dovecot23-backend-sqlite-2.3.3-4.7.4.i586" } }, { "category": "product_version", "name": "dovecot23-devel-2.3.3-4.7.4.i586", "product": { "name": "dovecot23-devel-2.3.3-4.7.4.i586", "product_id": "dovecot23-devel-2.3.3-4.7.4.i586" } }, { "category": "product_version", "name": "dovecot23-fts-2.3.3-4.7.4.i586", "product": { "name": "dovecot23-fts-2.3.3-4.7.4.i586", "product_id": "dovecot23-fts-2.3.3-4.7.4.i586" } }, { "category": "product_version", "name": "dovecot23-fts-lucene-2.3.3-4.7.4.i586", "product": { "name": "dovecot23-fts-lucene-2.3.3-4.7.4.i586", "product_id": "dovecot23-fts-lucene-2.3.3-4.7.4.i586" } }, { "category": "product_version", "name": "dovecot23-fts-solr-2.3.3-4.7.4.i586", "product": { "name": "dovecot23-fts-solr-2.3.3-4.7.4.i586", "product_id": "dovecot23-fts-solr-2.3.3-4.7.4.i586" } }, { "category": "product_version", "name": "dovecot23-fts-squat-2.3.3-4.7.4.i586", "product": { "name": "dovecot23-fts-squat-2.3.3-4.7.4.i586", "product_id": "dovecot23-fts-squat-2.3.3-4.7.4.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "dovecot23-2.3.3-4.7.4.ppc64le", "product": { "name": "dovecot23-2.3.3-4.7.4.ppc64le", "product_id": "dovecot23-2.3.3-4.7.4.ppc64le" } }, { "category": "product_version", "name": "dovecot23-backend-mysql-2.3.3-4.7.4.ppc64le", "product": { "name": "dovecot23-backend-mysql-2.3.3-4.7.4.ppc64le", "product_id": "dovecot23-backend-mysql-2.3.3-4.7.4.ppc64le" } }, { "category": "product_version", "name": "dovecot23-backend-pgsql-2.3.3-4.7.4.ppc64le", "product": { "name": "dovecot23-backend-pgsql-2.3.3-4.7.4.ppc64le", "product_id": "dovecot23-backend-pgsql-2.3.3-4.7.4.ppc64le" } }, { "category": "product_version", "name": "dovecot23-backend-sqlite-2.3.3-4.7.4.ppc64le", "product": { "name": "dovecot23-backend-sqlite-2.3.3-4.7.4.ppc64le", "product_id": "dovecot23-backend-sqlite-2.3.3-4.7.4.ppc64le" } }, { "category": "product_version", "name": "dovecot23-devel-2.3.3-4.7.4.ppc64le", "product": { "name": "dovecot23-devel-2.3.3-4.7.4.ppc64le", "product_id": "dovecot23-devel-2.3.3-4.7.4.ppc64le" } }, { "category": "product_version", "name": "dovecot23-fts-2.3.3-4.7.4.ppc64le", "product": { "name": "dovecot23-fts-2.3.3-4.7.4.ppc64le", "product_id": "dovecot23-fts-2.3.3-4.7.4.ppc64le" } }, { "category": "product_version", "name": "dovecot23-fts-lucene-2.3.3-4.7.4.ppc64le", "product": { "name": "dovecot23-fts-lucene-2.3.3-4.7.4.ppc64le", "product_id": "dovecot23-fts-lucene-2.3.3-4.7.4.ppc64le" } }, { "category": "product_version", "name": "dovecot23-fts-solr-2.3.3-4.7.4.ppc64le", "product": { "name": "dovecot23-fts-solr-2.3.3-4.7.4.ppc64le", "product_id": "dovecot23-fts-solr-2.3.3-4.7.4.ppc64le" } }, { "category": "product_version", "name": "dovecot23-fts-squat-2.3.3-4.7.4.ppc64le", "product": { "name": "dovecot23-fts-squat-2.3.3-4.7.4.ppc64le", "product_id": "dovecot23-fts-squat-2.3.3-4.7.4.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "dovecot23-2.3.3-4.7.4.s390x", "product": { "name": "dovecot23-2.3.3-4.7.4.s390x", "product_id": "dovecot23-2.3.3-4.7.4.s390x" } }, { "category": "product_version", "name": "dovecot23-backend-mysql-2.3.3-4.7.4.s390x", "product": { "name": "dovecot23-backend-mysql-2.3.3-4.7.4.s390x", "product_id": "dovecot23-backend-mysql-2.3.3-4.7.4.s390x" } }, { "category": "product_version", "name": "dovecot23-backend-pgsql-2.3.3-4.7.4.s390x", "product": { "name": "dovecot23-backend-pgsql-2.3.3-4.7.4.s390x", "product_id": "dovecot23-backend-pgsql-2.3.3-4.7.4.s390x" } }, { "category": "product_version", "name": "dovecot23-backend-sqlite-2.3.3-4.7.4.s390x", "product": { "name": "dovecot23-backend-sqlite-2.3.3-4.7.4.s390x", "product_id": "dovecot23-backend-sqlite-2.3.3-4.7.4.s390x" } }, { "category": "product_version", "name": "dovecot23-devel-2.3.3-4.7.4.s390x", "product": { "name": "dovecot23-devel-2.3.3-4.7.4.s390x", "product_id": "dovecot23-devel-2.3.3-4.7.4.s390x" } }, { "category": "product_version", "name": "dovecot23-fts-2.3.3-4.7.4.s390x", "product": { "name": "dovecot23-fts-2.3.3-4.7.4.s390x", "product_id": "dovecot23-fts-2.3.3-4.7.4.s390x" } }, { "category": "product_version", "name": "dovecot23-fts-lucene-2.3.3-4.7.4.s390x", "product": { "name": "dovecot23-fts-lucene-2.3.3-4.7.4.s390x", "product_id": "dovecot23-fts-lucene-2.3.3-4.7.4.s390x" } }, { "category": "product_version", "name": "dovecot23-fts-solr-2.3.3-4.7.4.s390x", "product": { "name": "dovecot23-fts-solr-2.3.3-4.7.4.s390x", "product_id": "dovecot23-fts-solr-2.3.3-4.7.4.s390x" } }, { "category": "product_version", "name": "dovecot23-fts-squat-2.3.3-4.7.4.s390x", "product": { "name": "dovecot23-fts-squat-2.3.3-4.7.4.s390x", "product_id": "dovecot23-fts-squat-2.3.3-4.7.4.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dovecot23-2.3.3-4.7.4.x86_64", "product": { "name": "dovecot23-2.3.3-4.7.4.x86_64", "product_id": "dovecot23-2.3.3-4.7.4.x86_64" } }, { "category": "product_version", "name": "dovecot23-backend-mysql-2.3.3-4.7.4.x86_64", "product": { "name": "dovecot23-backend-mysql-2.3.3-4.7.4.x86_64", "product_id": "dovecot23-backend-mysql-2.3.3-4.7.4.x86_64" } }, { "category": "product_version", "name": "dovecot23-backend-pgsql-2.3.3-4.7.4.x86_64", "product": { "name": "dovecot23-backend-pgsql-2.3.3-4.7.4.x86_64", "product_id": "dovecot23-backend-pgsql-2.3.3-4.7.4.x86_64" } }, { "category": "product_version", "name": "dovecot23-backend-sqlite-2.3.3-4.7.4.x86_64", "product": { "name": "dovecot23-backend-sqlite-2.3.3-4.7.4.x86_64", "product_id": "dovecot23-backend-sqlite-2.3.3-4.7.4.x86_64" } }, { "category": "product_version", "name": "dovecot23-devel-2.3.3-4.7.4.x86_64", "product": { "name": "dovecot23-devel-2.3.3-4.7.4.x86_64", "product_id": "dovecot23-devel-2.3.3-4.7.4.x86_64" } }, { "category": "product_version", "name": "dovecot23-fts-2.3.3-4.7.4.x86_64", "product": { "name": "dovecot23-fts-2.3.3-4.7.4.x86_64", "product_id": "dovecot23-fts-2.3.3-4.7.4.x86_64" } }, { "category": "product_version", "name": "dovecot23-fts-lucene-2.3.3-4.7.4.x86_64", "product": { "name": "dovecot23-fts-lucene-2.3.3-4.7.4.x86_64", "product_id": "dovecot23-fts-lucene-2.3.3-4.7.4.x86_64" } }, { "category": "product_version", "name": "dovecot23-fts-solr-2.3.3-4.7.4.x86_64", "product": { "name": "dovecot23-fts-solr-2.3.3-4.7.4.x86_64", "product_id": "dovecot23-fts-solr-2.3.3-4.7.4.x86_64" } }, { "category": "product_version", "name": "dovecot23-fts-squat-2.3.3-4.7.4.x86_64", "product": { "name": "dovecot23-fts-squat-2.3.3-4.7.4.x86_64", "product_id": "dovecot23-fts-squat-2.3.3-4.7.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dovecot23-2.3.3-4.7.4.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.aarch64" }, "product_reference": "dovecot23-2.3.3-4.7.4.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-2.3.3-4.7.4.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.ppc64le" }, "product_reference": "dovecot23-2.3.3-4.7.4.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-2.3.3-4.7.4.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.s390x" }, "product_reference": "dovecot23-2.3.3-4.7.4.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-2.3.3-4.7.4.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.x86_64" }, "product_reference": "dovecot23-2.3.3-4.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-mysql-2.3.3-4.7.4.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.aarch64" }, "product_reference": "dovecot23-backend-mysql-2.3.3-4.7.4.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-mysql-2.3.3-4.7.4.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.ppc64le" }, "product_reference": "dovecot23-backend-mysql-2.3.3-4.7.4.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-mysql-2.3.3-4.7.4.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.s390x" }, "product_reference": "dovecot23-backend-mysql-2.3.3-4.7.4.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-mysql-2.3.3-4.7.4.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.x86_64" }, "product_reference": "dovecot23-backend-mysql-2.3.3-4.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-pgsql-2.3.3-4.7.4.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.aarch64" }, "product_reference": "dovecot23-backend-pgsql-2.3.3-4.7.4.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-pgsql-2.3.3-4.7.4.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.ppc64le" }, "product_reference": "dovecot23-backend-pgsql-2.3.3-4.7.4.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-pgsql-2.3.3-4.7.4.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.s390x" }, "product_reference": "dovecot23-backend-pgsql-2.3.3-4.7.4.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-pgsql-2.3.3-4.7.4.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.x86_64" }, "product_reference": "dovecot23-backend-pgsql-2.3.3-4.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-sqlite-2.3.3-4.7.4.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.aarch64" }, "product_reference": "dovecot23-backend-sqlite-2.3.3-4.7.4.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-sqlite-2.3.3-4.7.4.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.ppc64le" }, "product_reference": "dovecot23-backend-sqlite-2.3.3-4.7.4.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-sqlite-2.3.3-4.7.4.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.s390x" }, "product_reference": "dovecot23-backend-sqlite-2.3.3-4.7.4.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-backend-sqlite-2.3.3-4.7.4.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.x86_64" }, "product_reference": "dovecot23-backend-sqlite-2.3.3-4.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-devel-2.3.3-4.7.4.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.aarch64" }, "product_reference": "dovecot23-devel-2.3.3-4.7.4.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-devel-2.3.3-4.7.4.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.ppc64le" }, "product_reference": "dovecot23-devel-2.3.3-4.7.4.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-devel-2.3.3-4.7.4.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.s390x" }, "product_reference": "dovecot23-devel-2.3.3-4.7.4.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-devel-2.3.3-4.7.4.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.x86_64" }, "product_reference": "dovecot23-devel-2.3.3-4.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-2.3.3-4.7.4.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.aarch64" }, "product_reference": "dovecot23-fts-2.3.3-4.7.4.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-2.3.3-4.7.4.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.ppc64le" }, "product_reference": "dovecot23-fts-2.3.3-4.7.4.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-2.3.3-4.7.4.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.s390x" }, "product_reference": "dovecot23-fts-2.3.3-4.7.4.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-2.3.3-4.7.4.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.x86_64" }, "product_reference": "dovecot23-fts-2.3.3-4.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-lucene-2.3.3-4.7.4.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.aarch64" }, "product_reference": "dovecot23-fts-lucene-2.3.3-4.7.4.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-lucene-2.3.3-4.7.4.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.ppc64le" }, "product_reference": "dovecot23-fts-lucene-2.3.3-4.7.4.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-lucene-2.3.3-4.7.4.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.s390x" }, "product_reference": "dovecot23-fts-lucene-2.3.3-4.7.4.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-lucene-2.3.3-4.7.4.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.x86_64" }, "product_reference": "dovecot23-fts-lucene-2.3.3-4.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-solr-2.3.3-4.7.4.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.aarch64" }, "product_reference": "dovecot23-fts-solr-2.3.3-4.7.4.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-solr-2.3.3-4.7.4.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.ppc64le" }, "product_reference": "dovecot23-fts-solr-2.3.3-4.7.4.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-solr-2.3.3-4.7.4.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.s390x" }, "product_reference": "dovecot23-fts-solr-2.3.3-4.7.4.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-solr-2.3.3-4.7.4.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.x86_64" }, "product_reference": "dovecot23-fts-solr-2.3.3-4.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-squat-2.3.3-4.7.4.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.aarch64" }, "product_reference": "dovecot23-fts-squat-2.3.3-4.7.4.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-squat-2.3.3-4.7.4.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.ppc64le" }, "product_reference": "dovecot23-fts-squat-2.3.3-4.7.4.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-squat-2.3.3-4.7.4.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.s390x" }, "product_reference": "dovecot23-fts-squat-2.3.3-4.7.4.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "dovecot23-fts-squat-2.3.3-4.7.4.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.x86_64" }, "product_reference": "dovecot23-fts-squat-2.3.3-4.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3814" } ], "notes": [ { "category": "general", "text": "It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3814", "url": "https://www.suse.com/security/cve/CVE-2019-3814" }, { "category": "external", "summary": "SUSE Bug 1123022 for CVE-2019-3814", "url": "https://bugzilla.suse.com/1123022" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-mysql-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-pgsql-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-backend-sqlite-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-devel-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-lucene-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-solr-2.3.3-4.7.4.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.s390x", "SUSE Linux Enterprise Module for Server Applications 15:dovecot23-fts-squat-2.3.3-4.7.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-15T06:04:40Z", "details": "important" } ], "title": "CVE-2019-3814" } ] }
wid-sec-w-2025-0243
Vulnerability from csaf_certbund
Published
2019-02-05 23:00
Modified
2025-02-02 23:00
Summary
Dovecot: Schwachstelle ermöglicht Erlangen von Benutzerrechten
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dovecot ist ein Open Source IMAP und POP3 E-Mail Server für Linux und auf Linux basierende Systeme.
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Dovecot ausnutzen, um Benutzerrechte zu erlangen.
Betroffene Betriebssysteme
- Linux
- UNIX
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dovecot ist ein Open Source IMAP und POP3 E-Mail Server f\u00fcr Linux und auf Linux basierende Systeme.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Dovecot ausnutzen, um Benutzerrechte zu erlangen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0243 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2025-0243.json" }, { "category": "self", "summary": "WID-SEC-2025-0243 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0243" }, { "category": "external", "summary": "Dovecot Mailing Liste vom 2019-02-05", "url": "https://dovecot.org/list/dovecot/2019-February/114575.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3881-2 vom 2019-02-05", "url": "https://usn.ubuntu.com/3881-2/" }, { "category": "external", "summary": "Debian Security Advisory DSA-4385-1 vom 2019-02-05", "url": "https://www.debian.org/security/2019/dsa-4385" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-201902-1 vom 2019-02-07", "url": "https://security.archlinux.org/ASA-201902-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0414-1 vom 2019-02-15", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190414-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0900-1 vom 2019-04-08", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190900-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3467 vom 2019-11-05", "url": "https://access.redhat.com/errata/RHSA-2019:3467" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1062 vom 2020-03-31", "url": "https://access.redhat.com/errata/RHSA-2020:1062" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14715-1 vom 2025-01-31", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KZSDCZ5LA6IHY7KXVSL6ULAJVP6OFT2M/" } ], "source_lang": "en-US", "title": "Dovecot: Schwachstelle erm\u00f6glicht Erlangen von Benutzerrechten", "tracking": { "current_release_date": "2025-02-02T23:00:00.000+00:00", "generator": { "date": "2025-02-03T09:07:30.227+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2025-0243", "initial_release_date": "2019-02-05T23:00:00.000+00:00", "revision_history": [ { "date": "2019-02-05T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2019-02-06T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Arch Linux aufgenommen" }, { "date": "2019-02-17T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-04-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-04-17T22:00:00.000+00:00", "number": "5", "summary": "Referenz(en) aufgenommen: GLSA/201904-19" }, { "date": "2019-06-04T22:00:00.000+00:00", "number": "6", "summary": "Referenz(en) aufgenommen: FEDORA-2019-1B61A528DD, FEDORA-2019-9E004DECEA" }, { "date": "2019-11-05T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-03-31T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-02-02T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von openSUSE aufgenommen" } ], "status": "final", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Arch Linux", "product": { "name": "Open Source Arch Linux", "product_id": "T013312", "product_identification_helper": { "cpe": "cpe:/o:archlinux:archlinux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c2.2.36.1", "product": { "name": "Open Source Dovecot \u003c2.2.36.1", "product_id": "T013563" } }, { "category": "product_version", "name": "2.2.36.1", "product": { "name": "Open Source Dovecot 2.2.36.1", "product_id": "T013563-fixed", "product_identification_helper": { "cpe": "cpe:/a:dovecot:dovecot:2.2.36.1" } } }, { "category": "product_version_range", "name": "\u003c2.3.4.1", "product": { "name": "Open Source Dovecot \u003c2.3.4.1", "product_id": "T013564" } }, { "category": "product_version", "name": "2.3.4.1", "product": { "name": "Open Source Dovecot 2.3.4.1", "product_id": "T013564-fixed", "product_identification_helper": { "cpe": "cpe:/a:dovecot:dovecot:2.3.4.1" } } } ], "category": "product_name", "name": "Dovecot" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3814", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Dovecot bei der Verwendung von TLS Client Zertifikatsbasierter Authentifizierung. Wenn sich ein Client mit einem Zertifikat authentifiziert, verwendet Dovecot ein bestimmtes Zertifikatsattribut (konfiguriert in \"ssl_cert_username_field\"), um den entsprechenden Benutzernamen zu finden. Wenn dieses Attribut leer ist, nimmt Dovecot einen separat angegebenen Benutzernamen an, ohne das entsprechende Passwort zu verlangen. Dies erm\u00f6glicht es einem Angreifer, sich als ein anderer Benutzer auszugeben. Eine Konfiguration ist anf\u00e4llig, wenn sie die folgenden beiden Einstellungen enth\u00e4lt: \"auth_ssl_require_client_cert = yes\" und \"auth_ssl_username_from_cert = yes\"." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T013312", "T027843", "T013563", "T013564" ] }, "release_date": "2019-02-05T23:00:00.000+00:00", "title": "CVE-2019-3814" } ] }
fkie_cve-2019-3814
Vulnerability from fkie_nvd
Published
2019-03-27 13:29
Modified
2024-11-21 04:42
Severity ?
7.7 (High) - CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
6.8 (Medium) - CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
6.8 (Medium) - CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
Summary
It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:3467 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814 | Issue Tracking, Release Notes, Third Party Advisory | |
secalert@redhat.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4XLI55NGRDTGMVOPYFCPPFNPA5VKYSSY/ | ||
secalert@redhat.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHFZ5OWRIZGIWZJ5PTNVWWZNLLNH4XYS/ | ||
secalert@redhat.com | https://security.gentoo.org/glsa/201904-19 | ||
secalert@redhat.com | https://www.dovecot.org/list/dovecot/2019-February/114575.html | Exploit, Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:3467 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814 | Issue Tracking, Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4XLI55NGRDTGMVOPYFCPPFNPA5VKYSSY/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHFZ5OWRIZGIWZJ5PTNVWWZNLLNH4XYS/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201904-19 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.dovecot.org/list/dovecot/2019-February/114575.html | Exploit, Mailing List, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dovecot | dovecot | * | |
dovecot | dovecot | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 | |
opensuse | leap | 42.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7EC4FD5-8BCE-4412-B8F6-53F4DD0D6CE7", "versionEndExcluding": "2.2.36.1", "versionStartIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C44A57B-1823-40EE-A24F-44144C505859", "versionEndExcluding": "2.3.4.1", "versionStartIncluding": "2.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "matchCriteriaId": "5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users." }, { "lang": "es", "value": "Se ha descubierto que Dovecot, en versiones anteriores a la 2.2.36.1 y 2.3.4.1, gestiona de manera incorrecta los certificados del cliente. Un atacante remoto en posesi\u00f3n de un certificado v\u00e1lido con un campo \"username\" vac\u00edo podr\u00eda emplear este problema para suplantar a otros usuarios." } ], "id": "CVE-2019-3814", "lastModified": "2024-11-21T04:42:35.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.3, "impactScore": 5.8, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-27T13:29:01.337", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2019:3467" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Release Notes", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4XLI55NGRDTGMVOPYFCPPFNPA5VKYSSY/" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHFZ5OWRIZGIWZJ5PTNVWWZNLLNH4XYS/" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201904-19" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Mailing List", "Vendor Advisory" ], "url": "https://www.dovecot.org/list/dovecot/2019-February/114575.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2019:3467" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Release Notes", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4XLI55NGRDTGMVOPYFCPPFNPA5VKYSSY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHFZ5OWRIZGIWZJ5PTNVWWZNLLNH4XYS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201904-19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Vendor Advisory" ], "url": "https://www.dovecot.org/list/dovecot/2019-February/114575.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-2727-qgh5-485g
Vulnerability from github
Published
2022-05-24 16:59
Modified
2024-04-04 02:31
Severity ?
VLAI Severity ?
Details
It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.
{ "affected": [], "aliases": [ "CVE-2019-3814" ], "database_specific": { "cwe_ids": [ "CWE-295" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-03-27T13:29:01Z", "severity": "MODERATE" }, "details": "It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.", "id": "GHSA-2727-qgh5-485g", "modified": "2024-04-04T02:31:18Z", "published": "2022-05-24T16:59:27Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3814" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3467" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4XLI55NGRDTGMVOPYFCPPFNPA5VKYSSY" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHFZ5OWRIZGIWZJ5PTNVWWZNLLNH4XYS" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4XLI55NGRDTGMVOPYFCPPFNPA5VKYSSY" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHFZ5OWRIZGIWZJ5PTNVWWZNLLNH4XYS" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201904-19" }, { "type": "WEB", "url": "https://www.dovecot.org/list/dovecot/2019-February/114575.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ] }
gsd-2019-3814
Vulnerability from gsd
Modified
2023-12-13 01:24
Details
It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-3814", "description": "It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.", "id": "GSD-2019-3814", "references": [ "https://www.suse.com/security/cve/CVE-2019-3814.html", "https://www.debian.org/security/2019/dsa-4385", "https://access.redhat.com/errata/RHSA-2020:1062", "https://access.redhat.com/errata/RHSA-2019:3467", "https://ubuntu.com/security/CVE-2019-3814", "https://advisories.mageia.org/CVE-2019-3814.html", "https://security.archlinux.org/CVE-2019-3814", "https://alas.aws.amazon.com/cve/html/CVE-2019-3814.html", "https://linux.oracle.com/cve/CVE-2019-3814.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-3814" ], "details": "It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.", "id": "GSD-2019-3814", "modified": "2023-12-13T01:24:04.790511Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3814", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "dovecot", "version": { "version_data": [ { "version_value": "2.2.36.1" }, { "version_value": "2.3.4.1" } ] } } ] }, "vendor_name": "dovecot" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.7/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.dovecot.org/list/dovecot/2019-February/114575.html", "refsource": "MISC", "url": "https://www.dovecot.org/list/dovecot/2019-February/114575.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814" }, { "name": "openSUSE-SU-2019:1220", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html" }, { "name": "GLSA-201904-19", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201904-19" }, { "name": "FEDORA-2019-9e004decea", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4XLI55NGRDTGMVOPYFCPPFNPA5VKYSSY/" }, { "name": "FEDORA-2019-1b61a528dd", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHFZ5OWRIZGIWZJ5PTNVWWZNLLNH4XYS/" }, { "name": "RHSA-2019:3467", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3467" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.2.36.1", "versionStartIncluding": "1.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.3.4.1", "versionStartIncluding": "2.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3814" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-295" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.dovecot.org/list/dovecot/2019-February/114575.html", "refsource": "MISC", "tags": [ "Exploit", "Mailing List", "Vendor Advisory" ], "url": "https://www.dovecot.org/list/dovecot/2019-February/114575.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Release Notes", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3814" }, { "name": "openSUSE-SU-2019:1220", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html" }, { "name": "GLSA-201904-19", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201904-19" }, { "name": "FEDORA-2019-9e004decea", "refsource": "FEDORA", "tags": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4XLI55NGRDTGMVOPYFCPPFNPA5VKYSSY/" }, { "name": "FEDORA-2019-1b61a528dd", "refsource": "FEDORA", "tags": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHFZ5OWRIZGIWZJ5PTNVWWZNLLNH4XYS/" }, { "name": "RHSA-2019:3467", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2019:3467" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.2 } }, "lastModifiedDate": "2019-06-14T03:29Z", "publishedDate": "2019-03-27T13:29Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…