Source: dovecot
Version: 1:2.4.3+dfsg1-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for dovecot.

CVE-2026-27851[0]:
| When safe filter is used with variable expansion, all following
| pipelines on the same string are incorrectly interpreted as safe
| too, enabling unsafe data to be unescaped. This can enable SQL /
| LDAP injection attacks when used in authentication. Avoid using safe
| filter until on fixed version. No publicly available exploits are
| known.


CVE-2026-33603[1]:
| Attacker can use a specially crafted base64 exchange between Dovecot
| and Client to fake SCRAM TLS channel binding. This requires that the
| attacker is able to position itself between Dovecot and the client
| connection. If successful, the attacker can eavesdrop communications
| between Dovecot and client as MITM proxy. Install fixed version. No
| publicly available exploits are known.


CVE-2026-40016[2]:
| Attacker can upload a malicious Sieve script over ManageSieve
| service (or locally) to bypass configured CPU time limits for Sieve
| up to 130 times of the configured limit. Attacker can use this to
| degrade server performance and bypass configured CPU time limits for
| Sieve scripts. Install fixed version, or alternatively prevent
| direct access to Sieve scripts via ManageSieve or local access. No
| publicly available exploits are known.


CVE-2026-40020[3]:
| Attacker can use the IMAP SETACL command to inject the anyone
| permission to user's dovecot-acl file even if
| imap_acl_allow_anyone=no. This causes folders to be spammed to all
| users. The impact is limited to being able to spam folders to other
| users, no unexpected access is gained. Install to fixed version. No
| publicly available exploits are known.


CVE-2026-42006[4]:
| An attacker can cause uncontrolled memory usage with excessive
| bracing over IMAP. The fix in CVE-2026-27857 was incomplete, only
| blocking one way of doing this, so there was still another way left
| open. In particular, the fix was for closing braces, but you could
| still use open braces to bypass the limit. Using excessive bracing,
| attacker can cause memory usage up to configured memory limit.
| Install fixed version, or configure vsz_limit for imap process to
| low value. No publicly available exploits are known.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-27851
    https://www.cve.org/CVERecord?id=CVE-2026-27851
[1] https://security-tracker.debian.org/tracker/CVE-2026-33603
    https://www.cve.org/CVERecord?id=CVE-2026-33603
[2] https://security-tracker.debian.org/tracker/CVE-2026-40016
    https://www.cve.org/CVERecord?id=CVE-2026-40016
[3] https://security-tracker.debian.org/tracker/CVE-2026-40020
    https://www.cve.org/CVERecord?id=CVE-2026-40020
[4] https://security-tracker.debian.org/tracker/CVE-2026-42006
    https://www.cve.org/CVERecord?id=CVE-2026-42006

Regards,
Salvatore

Reply via email to