Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-30189 (GCVE-0-2025-30189)
Vulnerability from cvelistv5 – Published: 2025-10-31 09:02 – Updated: 2026-03-27 12:33- CWE-1250 - Improper Preservation of Consistency Between Independent Representations of Shared State
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Open-Xchange GmbH | OX Dovecot Pro |
Affected:
0 , ≤ 3.1.0
(semver)
Affected: 0 , ≤ 2.4.0 (semver) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T21:09:57.944Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2025/Oct/29"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/10/29/4"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-30189",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-31T18:29:20.964859Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-31T18:37:37.432Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"core"
],
"product": "OX Dovecot Pro",
"vendor": "Open-Xchange GmbH",
"versions": [
{
"lessThanOrEqual": "3.1.0",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "2.4.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers. No publicly available exploits are known."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1250",
"description": "Improper Preservation of Consistency Between Independent Representations of Shared State",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-27T12:33:18.387Z",
"orgId": "8ce71d90-2354-404b-a86e-bec2cc4e6981",
"shortName": "OX"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0001.json"
}
],
"source": {
"defect": "DOV-7830",
"discovery": "EXTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "8ce71d90-2354-404b-a86e-bec2cc4e6981",
"assignerShortName": "OX",
"cveId": "CVE-2025-30189",
"datePublished": "2025-10-31T09:02:33.273Z",
"dateReserved": "2025-03-18T08:39:46.884Z",
"dateUpdated": "2026-03-27T12:33:18.387Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-30189\",\"sourceIdentifier\":\"security@open-xchange.com\",\"published\":\"2025-10-31T09:15:47.313\",\"lastModified\":\"2026-03-27T09:16:18.440\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers. No publicly available exploits are known.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@open-xchange.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"security@open-xchange.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1250\"}]}],\"references\":[{\"url\":\"https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0001.json\",\"source\":\"security@open-xchange.com\"},{\"url\":\"http://seclists.org/fulldisclosure/2025/Oct/29\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/10/29/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://seclists.org/fulldisclosure/2025/Oct/29\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/10/29/4\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T21:09:57.944Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-30189\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-31T18:29:20.964859Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-31T18:37:05.071Z\"}}], \"cna\": {\"source\": {\"defect\": \"DOV-7830\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Open-Xchange GmbH\", \"modules\": [\"core\"], \"product\": \"OX Dovecot Pro\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"3.1.0\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.4.0\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0001.json\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers. No publicly available exploits are known.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-1250\", \"description\": \"Improper Preservation of Consistency Between Independent Representations of Shared State\"}]}], \"providerMetadata\": {\"orgId\": \"8ce71d90-2354-404b-a86e-bec2cc4e6981\", \"shortName\": \"OX\", \"dateUpdated\": \"2026-03-27T08:10:14.502Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-30189\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-27T08:10:14.502Z\", \"dateReserved\": \"2025-03-18T08:39:46.884Z\", \"assignerOrgId\": \"8ce71d90-2354-404b-a86e-bec2cc4e6981\", \"datePublished\": \"2025-10-31T09:02:33.273Z\", \"assignerShortName\": \"OX\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
OXDC-ADV-2025-0001
Vulnerability from csaf_ox - Published: 2025-10-31 00:00 - Updated: 2025-11-27 00:00When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users.
{
"document": {
"aggregate_severity": {
"text": "HIGH"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Open-Xchange GmbH. All rights reserved.",
"tlp": {
"label": "GREEN",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution-NoDerivatives 4.0 International License (https://creativecommons.org/licenses/by-nd/4.0/). If you distribute this content, you must provide attribution to Open-Xchange GmbH and provide a link to the original. You may not distribute a modified version of this content.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"name": "Open-Xchange GmbH",
"namespace": "https://open-xchange.com/"
},
"references": [
{
"category": "self",
"summary": "Canonical CSAF document",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2025/oxdc-adv-2025-0001.json"
},
{
"category": "self",
"summary": "Markdown representation",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/md/2025/oxdc-adv-2025-0001.md"
},
{
"category": "self",
"summary": "HTML representation",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/html/2025/oxdc-adv-2025-0001.html"
},
{
"category": "self",
"summary": "Plain-text representation",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/txt/2025/oxdc-adv-2025-0001.txt"
}
],
"title": "OX Dovecot Pro Security Advisory OXDC-ADV-2025-0001",
"tracking": {
"current_release_date": "2025-11-27T00:00:00+00:00",
"generator": {
"date": "2025-11-27T10:32:50+00:00",
"engine": {
"name": "OX CSAF",
"version": "1.0.0"
}
},
"id": "OXDC-ADV-2025-0001",
"initial_release_date": "2025-10-31T00:00:00+00:00",
"revision_history": [
{
"date": "2025-10-31T00:00:00+00:00",
"number": "1",
"summary": "Initial release"
},
{
"date": "2025-10-31T00:00:00+00:00",
"number": "2",
"summary": "Public release"
},
{
"date": "2025-10-31T00:00:00+00:00",
"number": "3",
"summary": "Fix versions"
},
{
"date": "2025-10-31T00:00:00+00:00",
"number": "4",
"summary": "Public release"
},
{
"date": "2025-10-31T00:00:00+00:00",
"number": "5",
"summary": "Public release"
},
{
"date": "2025-11-27T00:00:00+00:00",
"number": "6",
"summary": "Public release"
},
{
"date": "2025-11-27T00:00:00+00:00",
"number": "7",
"summary": "Public release"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.4.0",
"product": {
"name": "Dovecot CE 2.4.0",
"product_id": "OXDC-CE_2.4.0",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:2.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "2.4.2",
"product": {
"name": "Dovecot CE 2.4.2",
"product_id": "OXDC-CE_2.4.2",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:2.4.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Dovecot CE"
}
],
"category": "vendor",
"name": "Open-Xchange GmbH"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Erik \u003cerik@broadlux.com\u003e"
]
}
],
"cve": "CVE-2025-30189",
"cwe": {
"id": "CWE-1250",
"name": "Improper Preservation of Consistency Between Independent Representations of Shared State"
},
"discovery_date": "2025-07-25T01:04:36+03:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-7830"
}
],
"notes": [
{
"category": "description",
"text": "When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users."
}
],
"product_status": {
"first_fixed": [
"OXDC-CE_2.4.2"
],
"last_affected": [
"OXDC-CE_2.4.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-29T00:00:00+00:00",
"details": "Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers.",
"product_ids": [
"OXDC-CE_2.4.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"OXDC-CE_2.4.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "After cached login, all subsequent logins are for same user."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "v2.4 regression: auth cache broken with several passdb / userdb"
}
]
}
OXDC-ADV-2026-0001
Vulnerability from csaf_ox - Published: 2026-03-27 00:00 - Updated: 2026-03-27 00:00When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users.
When sending invalid base64 SASL data, login process is disconnected from the auth server, causing all active authentication sessions to fail.
ManageSieve AUTHENTICATE command crashes when using literal as SASL initial response.
Dovecot has provided a script to use for attachment to text conversion. This script unsafely handles zip-style attachments.
When dovecot has been configured to use per-domain passwd files, and they are placed one path component above /etc, or slash has been added to allowed characters, path traversal can happen if the domain component is directory partial.
If auth_username_chars is empty, it is possible to inject arbitrary LDAP filter to Dovecot's LDAP authentication.
CWE-90 - Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')Dovecot SQL based authentication can be bypassed when auth_username_chars is cleared by admin.
A mail message containing excessive amount of RFC 2231 MIME parameters causes LMTP to use too much CPU.
Sending "NOOP (((...)))" command with 4000 parenthesis open+close results in ~1MB extra memory usage. Longer commands will result in client disconnection. This 1 MB can be left allocated for longer time periods by not sending the command ending LF. So attacker could connect possibly from even a single IP and create 1000 connections to allocate 1 GB of memory, which would likely result in reaching VSZ limit and killing the process and its other proxied connections.
Attacker can send a specifically crafted message before authentication that causes managesieve to allocate large amount of memory.
Doveadm credentials are verified using direct comparison which is susceptible to timing oracle attack. An attacker can use this to determine the configured credentials.
Dovecot OTP authentication is vulnerable to replay attack under specific conditions. If auth cache is enabled, and username is altered in passdb, then OTP credentials can be cached so that same OTP reply is valid.
{
"document": {
"aggregate_severity": {
"text": "HIGH"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Open-Xchange GmbH. All rights reserved.",
"tlp": {
"label": "GREEN",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution-NoDerivatives 4.0 International License (https://creativecommons.org/licenses/by-nd/4.0/). If you distribute this content, you must provide attribution to Open-Xchange GmbH and provide a link to the original. You may not distribute a modified version of this content.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"name": "Open-Xchange GmbH",
"namespace": "https://open-xchange.com/"
},
"references": [
{
"category": "self",
"summary": "Canonical CSAF document",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0001.json"
},
{
"category": "self",
"summary": "Markdown representation",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/md/2026/oxdc-adv-2026-0001.md"
},
{
"category": "self",
"summary": "HTML representation",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/html/2026/oxdc-adv-2026-0001.html"
},
{
"category": "self",
"summary": "Plain-text representation",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/txt/2026/oxdc-adv-2026-0001.txt"
}
],
"title": "OX Dovecot Security Advisory OXDC-ADV-2026-0001",
"tracking": {
"current_release_date": "2026-03-27T00:00:00+00:00",
"generator": {
"date": "2026-03-27T08:10:11+00:00",
"engine": {
"name": "OX CSAF",
"version": "1.0.0"
}
},
"id": "OXDC-ADV-2026-0001",
"initial_release_date": "2026-03-27T00:00:00+00:00",
"revision_history": [
{
"date": "2026-03-27T00:00:00+00:00",
"number": "1",
"summary": "Initial release"
},
{
"date": "2026-03-27T00:00:00+00:00",
"number": "2",
"summary": "Public release"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.1.0",
"product": {
"name": "OX Dovecot Pro 3.1.0",
"product_id": "OXDC-PRO_3.1.0",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "3.1.2",
"product": {
"name": "OX Dovecot Pro 3.1.2",
"product_id": "OXDC-PRO_3.1.2",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:3.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "3.1.3",
"product": {
"name": "OX Dovecot Pro 3.1.3",
"product_id": "OXDC-PRO_3.1.3",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:3.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "2.3.0",
"product": {
"name": "OX Dovecot Pro 2.3.0",
"product_id": "OXDC-PRO_2.3.0",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:2.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "2.3.22.1",
"product": {
"name": "OX Dovecot Pro 2.3.22.1",
"product_id": "OXDC-PRO_2.3.22.1",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:2.3.22.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "3.1.4",
"product": {
"name": "OX Dovecot Pro 3.1.4",
"product_id": "OXDC-PRO_3.1.4",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:3.1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "3.0.2",
"product": {
"name": "OX Dovecot Pro 3.0.2",
"product_id": "OXDC-PRO_3.0.2",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:3.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "3.0.5",
"product": {
"name": "OX Dovecot Pro 3.0.5",
"product_id": "OXDC-PRO_3.0.5",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:3.0.5:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "OX Dovecot Pro"
},
{
"branches": [
{
"category": "product_version",
"name": "2.4.0",
"product": {
"name": "OX Dovecot CE 2.4.0",
"product_id": "OXDC-CE_2.4.0",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:2.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "2.4.1",
"product": {
"name": "OX Dovecot CE 2.4.1",
"product_id": "OXDC-CE_2.4.1",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:2.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "2.4.3",
"product": {
"name": "OX Dovecot CE 2.4.3",
"product_id": "OXDC-CE_2.4.3",
"product_identification_helper": {
"cpe": "cpe:2.3:a:open-xchange:dovecot:2.4.3:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "OX Dovecot CE"
}
],
"category": "vendor",
"name": "Open-Xchange GmbH"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Erik \u003cerik@broadlux.com\u003e"
]
}
],
"cve": "CVE-2025-30189",
"cwe": {
"id": "CWE-1250",
"name": "Improper Preservation of Consistency Between Independent Representations of Shared State"
},
"discovery_date": "2025-07-24T22:04:36+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-7830"
}
],
"notes": [
{
"category": "description",
"text": "When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users."
}
],
"product_status": {
"first_fixed": [
"OXDC-CE_2.4.1"
],
"last_affected": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-27T00:00:00+00:00",
"details": "Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers.",
"product_ids": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "After cached login, all subsequent logins are for same user."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "v2.4 regression: auth cache broken with several passdb / userdb"
},
{
"cve": "CVE-2025-59028",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-11-04T09:22:58+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-8349"
}
],
"notes": [
{
"category": "description",
"text": "When sending invalid base64 SASL data, login process is disconnected from the auth server, causing all active authentication sessions to fail."
}
],
"product_status": {
"first_fixed": [
"OXDC-PRO_3.1.2",
"OXDC-CE_2.4.3"
],
"last_affected": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-27T00:00:00+00:00",
"details": "Install fixed version or disable concurrency in login processes (heavy perfomance penalty on large deployments).",
"product_ids": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Invalid BASE64 data can be used to DoS a vulnerable server to break concurrent logins."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "Invalid base64 authentication can cause DoS for other logins"
},
{
"cve": "CVE-2025-59032",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-11-29T01:35:59+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-8508"
}
],
"notes": [
{
"category": "description",
"text": "ManageSieve AUTHENTICATE command crashes when using literal as SASL initial response."
}
],
"product_status": {
"first_fixed": [
"OXDC-CE_2.4.3",
"OXDC-PRO_3.1.3"
],
"last_affected": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-27T00:00:00+00:00",
"details": "Control access to ManageSieve port, or disable the service if it\u0027s not needed. Alternatively upgrade to a fixed version.",
"product_ids": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "This can be used to crash ManageSieve service repeatedly, making it unavailable for other users."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "v2.4/v3.1 regression: Pigeonhole: ManageSieve panic occurs with sieve-connect as a client"
},
{
"acknowledgments": [
{
"names": [
"cavid@yeswehack"
]
}
],
"cve": "CVE-2025-59031",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-12-29T07:05:29+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-8584"
}
],
"notes": [
{
"category": "description",
"text": "Dovecot has provided a script to use for attachment to text conversion. This script unsafely handles zip-style attachments."
}
],
"product_status": {
"first_fixed": [
"OXDC-CE_2.4.3",
"OXDC-PRO_3.1.3",
"OXDC-PRO_2.3.22.1"
],
"last_affected": [
"OXDC-PRO_2.3.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-27T00:00:00+00:00",
"details": "Do not use the provided script, instead, use something else like FTS tika.",
"product_ids": [
"OXDC-PRO_2.3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"OXDC-PRO_2.3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Attacker can use specially crafted OOXML documents to cause unintended files on the system to be indexed and subsequently ending up in FTS indexes."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "decode2text.sh OOXML extraction may follow symlinks and read unintended files during indexing"
},
{
"acknowledgments": [
{
"names": [
"strokep@yeswehack"
]
}
],
"cve": "CVE-2026-0394",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-01-07T10:40:46+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-8591"
}
],
"notes": [
{
"category": "description",
"text": "When dovecot has been configured to use per-domain passwd files, and they are placed one path component above /etc, or slash has been added to allowed characters, path traversal can happen if the domain component is directory partial."
}
],
"product_status": {
"first_fixed": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
],
"last_affected": [
"OXDC-PRO_2.3.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-27T00:00:00+00:00",
"details": "Upgrade to fixed version, or use different authentication scheme that does not rely on paths. Alternatively you can also ensure that the per-domain passwd files are in some other location, such as /etc/dovecot/auth/%d.",
"product_ids": [
"OXDC-PRO_2.3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"OXDC-PRO_2.3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "This allows inadvertently reading /etc/passwd (or some other path which ends with passwd). If this file contains passwords, it can be used to authenticate wrongly, or if this is userdb, it can unexpectly make system users appear valid users. "
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "auth: Path traversal in passwd-file passdb using `%d` (domain) escapes base directory and opens `/etc/passwd`Pre-auth path traversal in passwd-file passdb using `%d` (domain) escapes base directory and opens `/etc/passwd`"
},
{
"acknowledgments": [
{
"names": [
"cookiejack15@yeswehack"
]
}
],
"cve": "CVE-2026-27860",
"cwe": {
"id": "CWE-90",
"name": "Improper Neutralization of Special Elements used in an LDAP Query (\u0027LDAP Injection\u0027)"
},
"discovery_date": "2026-02-20T16:22:20+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-8775"
}
],
"notes": [
{
"category": "description",
"text": "If auth_username_chars is empty, it is possible to inject arbitrary LDAP filter to Dovecot\u0027s LDAP authentication."
}
],
"product_status": {
"first_fixed": [
"OXDC-CE_2.4.3",
"OXDC-PRO_3.1.4"
],
"last_affected": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-27T00:00:00+00:00",
"details": "Do not clear out auth_username_chars, or install fixed version.",
"product_ids": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "This leads to potentially bypassing restrictions and allows probing of LDAP structure."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "v2.4/v3.1 regression: auth-ldap is not escaping usernames"
},
{
"acknowledgments": [
{
"names": [
"whisperer@yeswehack"
]
}
],
"cve": "CVE-2026-24031",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2026-02-23T09:45:13+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-8781"
}
],
"notes": [
{
"category": "description",
"text": "Dovecot SQL based authentication can be bypassed when auth_username_chars is cleared by admin."
}
],
"product_status": {
"first_fixed": [
"OXDC-CE_2.4.3",
"OXDC-PRO_3.1.4"
],
"last_affected": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-27T00:00:00+00:00",
"details": "Do not clear auth_username_chars. If this is not possible, install latest fixed version.",
"product_ids": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "This vulnerability allows bypassing authentication for any user and user enumeration."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "v2.4/v3.1 regression: SQL injection allows bypassing authentication"
},
{
"acknowledgments": [
{
"names": [
"djvirus@yeswehack"
]
}
],
"cve": "CVE-2026-27859",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2026-02-24T11:18:32+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-8787"
}
],
"notes": [
{
"category": "description",
"text": "A mail message containing excessive amount of RFC 2231 MIME parameters causes LMTP to use too much CPU."
}
],
"product_status": {
"first_fixed": [
"OXDC-PRO_3.0.5",
"OXDC-CE_2.4.3",
"OXDC-PRO_3.1.4"
],
"last_affected": [
"OXDC-PRO_3.0.2",
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-27T00:00:00+00:00",
"details": "Use MTA capabilities to limit RFC 2231 MIME parameters in mail messages, or upgrade to fixed version where the processing is limited.",
"product_ids": [
"OXDC-PRO_3.0.2",
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"OXDC-PRO_3.0.2",
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "A suitably formatted mail message causes mail delivery process to consume large amounts of CPU time."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "v3.0.2+ regression: Message headers MIME parameter parsing can cause excessive CPU usage"
},
{
"acknowledgments": [
{
"names": [
"whisperer@yeswehack"
]
}
],
"cve": "CVE-2026-27857",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2026-02-27T21:18:41+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-8816"
}
],
"notes": [
{
"category": "description",
"text": "Sending \"NOOP (((...)))\" command with 4000 parenthesis open+close results in ~1MB extra memory usage. Longer commands will result in client disconnection. This 1 MB can be left allocated for longer time periods by not sending the command ending LF. So attacker could connect possibly from even a single IP and create 1000 connections to allocate 1 GB of memory, which would likely result in reaching VSZ limit and killing the process and its other proxied connections."
}
],
"product_status": {
"first_fixed": [
"OXDC-PRO_3.0.5",
"OXDC-CE_2.4.3",
"OXDC-PRO_3.1.4",
"OXDC-PRO_2.3.22.1"
],
"last_affected": [
"OXDC-PRO_2.3.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-27T00:00:00+00:00",
"details": "Install fixed version, there is no other remediation.",
"product_ids": [
"OXDC-PRO_2.3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"OXDC-PRO_2.3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Attacker could connect possibly from even a single IP and create 1000 connections to allocate 1 GB of memory, which would likely result in reaching VSZ limit and killing the process and its other proxied connections."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "imap-login: Excessive memory usage DoS"
},
{
"acknowledgments": [
{
"names": [
"ilyar@yeswehack"
]
}
],
"cve": "CVE-2026-27858",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2026-02-28T20:40:17+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-8818"
}
],
"notes": [
{
"category": "description",
"text": "Attacker can send a specifically crafted message before authentication that causes managesieve to allocate large amount of memory.\r\n"
}
],
"product_status": {
"first_fixed": [
"OXDC-PRO_3.0.5",
"OXDC-CE_2.4.3",
"OXDC-PRO_3.1.4",
"OXDC-PRO_2.3.22.1"
],
"last_affected": [
"OXDC-PRO_2.3.0",
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-27T00:00:00+00:00",
"details": "Protect access to managesieve protocol, or install fixed version.",
"product_ids": [
"OXDC-PRO_2.3.0",
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OXDC-PRO_2.3.0",
"OXDC-PRO_3.1.0",
"OXDC-CE_2.4.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Attacker can force managesieve-login to be unavailable by repeatedly crashing the process."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "managesieve-login out-of-memory DoS"
},
{
"acknowledgments": [
{
"names": [
"bksparajuli@yeswehack"
]
}
],
"cve": "CVE-2026-27856",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2026-03-04T06:20:41+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-8830"
}
],
"notes": [
{
"category": "description",
"text": "Doveadm credentials are verified using direct comparison which is susceptible to timing oracle attack. An attacker can use this to determine the configured credentials."
}
],
"product_status": {
"first_fixed": [
"OXDC-PRO_3.0.5",
"OXDC-CE_2.4.3",
"OXDC-PRO_3.1.4",
"OXDC-PRO_2.3.22.1"
],
"last_affected": [
"OXDC-PRO_2.3.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-27T00:00:00+00:00",
"details": "Limit access to the doveadm http service port, install fixed version.",
"product_ids": [
"OXDC-PRO_2.3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"OXDC-PRO_2.3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Figuring out the credential will lead into full access to the affected component."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "doveadm: Credentials verified without timing safety"
},
{
"acknowledgments": [
{
"names": [
"hamizanazman@yeswehack"
]
}
],
"cve": "CVE-2026-27855",
"cwe": {
"id": "CWE-294",
"name": "Authentication Bypass by Capture-replay"
},
"discovery_date": "2026-03-09T16:55:35+00:00",
"ids": [
{
"system_name": "JIRA OX Bug",
"text": "DOV-8859"
}
],
"notes": [
{
"category": "description",
"text": "Dovecot OTP authentication is vulnerable to replay attack under specific conditions. If auth cache is enabled, and username is altered in passdb, then OTP credentials can be cached so that same OTP reply is valid."
}
],
"product_status": {
"first_fixed": [
"OXDC-CE_2.4.3"
],
"last_affected": [
"OXDC-PRO_2.3.0"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-27T00:00:00+00:00",
"details": "If authentication happens over unsecure connection, switch to SCRAM protocol. Alternatively ensure the communcations are secured, and if possible switch to OAUTH2 or SCRAM.",
"product_ids": [
"OXDC-PRO_2.3.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"OXDC-PRO_2.3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "An attacker able to observe an OTP exchange is able to log in as the user."
},
{
"category": "exploit_status",
"details": "No publicly available exploits are known."
}
],
"title": "auth: OTP driver vulnerable to replay attack"
}
]
}
CERTFR-2025-AVI-0962
Vulnerability from certfr_avis - Published: 2025-11-04 - Updated: 2025-11-04
Une vulnérabilité a été découverte dans Dovecot. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Dovecot Pro core versions 2.4.x ant\u00e9rieures \u00e0 2.4.2",
"product": {
"name": "Dovecot",
"vendor": {
"name": "Dovecot",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-30189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30189"
}
],
"initial_release_date": "2025-11-04T00:00:00",
"last_revision_date": "2025-11-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0962",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Dovecot. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans Dovecot",
"vendor_advisories": [
{
"published_at": "2025-10-29",
"title": "Bulletin de s\u00e9curit\u00e9 Dovecot oxdc-adv-2025-0001",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/html/2025/oxdc-adv-2025-0001.html"
}
]
}
CERTFR-2025-AVI-0942
Vulnerability from certfr_avis - Published: 2025-10-31 - Updated: 2025-10-31
Une vulnérabilité a été découverte dans Dovecot. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Dovecot versions 2.4.x ant\u00e9rieures \u00e0 2.4.2",
"product": {
"name": "Dovecot",
"vendor": {
"name": "Dovecot",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-30189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30189"
}
],
"initial_release_date": "2025-10-31T00:00:00",
"last_revision_date": "2025-10-31T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0942",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-31T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Dovecot. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans Dovecot",
"vendor_advisories": [
{
"published_at": "2025-10-29",
"title": "Bulletin de s\u00e9curit\u00e9 Dovecot G3K5HMBKW6XOYNBXYV5GUM2GR6WPUD4M",
"url": "https://dovecot.org/mailman3/archives/list/dovecot-news@dovecot.org/thread/G3K5HMBKW6XOYNBXYV5GUM2GR6WPUD4M/"
}
]
}
CERTFR-2025-AVI-0962
Vulnerability from certfr_avis - Published: 2025-11-04 - Updated: 2025-11-04
Une vulnérabilité a été découverte dans Dovecot. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Dovecot Pro core versions 2.4.x ant\u00e9rieures \u00e0 2.4.2",
"product": {
"name": "Dovecot",
"vendor": {
"name": "Dovecot",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-30189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30189"
}
],
"initial_release_date": "2025-11-04T00:00:00",
"last_revision_date": "2025-11-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0962",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Dovecot. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans Dovecot",
"vendor_advisories": [
{
"published_at": "2025-10-29",
"title": "Bulletin de s\u00e9curit\u00e9 Dovecot oxdc-adv-2025-0001",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/html/2025/oxdc-adv-2025-0001.html"
}
]
}
CERTFR-2025-AVI-0942
Vulnerability from certfr_avis - Published: 2025-10-31 - Updated: 2025-10-31
Une vulnérabilité a été découverte dans Dovecot. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Dovecot versions 2.4.x ant\u00e9rieures \u00e0 2.4.2",
"product": {
"name": "Dovecot",
"vendor": {
"name": "Dovecot",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-30189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30189"
}
],
"initial_release_date": "2025-10-31T00:00:00",
"last_revision_date": "2025-10-31T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0942",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-31T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Dovecot. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans Dovecot",
"vendor_advisories": [
{
"published_at": "2025-10-29",
"title": "Bulletin de s\u00e9curit\u00e9 Dovecot G3K5HMBKW6XOYNBXYV5GUM2GR6WPUD4M",
"url": "https://dovecot.org/mailman3/archives/list/dovecot-news@dovecot.org/thread/G3K5HMBKW6XOYNBXYV5GUM2GR6WPUD4M/"
}
]
}
FKIE_CVE-2025-30189
Vulnerability from fkie_nvd - Published: 2025-10-31 09:15 - Updated: 2026-03-27 09:16| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers. No publicly available exploits are known."
}
],
"id": "CVE-2025-30189",
"lastModified": "2026-03-27T09:16:18.440",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2,
"source": "security@open-xchange.com",
"type": "Secondary"
}
]
},
"published": "2025-10-31T09:15:47.313",
"references": [
{
"source": "security@open-xchange.com",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0001.json"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Oct/29"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/10/29/4"
}
],
"sourceIdentifier": "security@open-xchange.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1250"
}
],
"source": "security@open-xchange.com",
"type": "Secondary"
}
]
}
OPENSUSE-SU-2025:20113-1
Vulnerability from csaf_opensuse - Published: 2025-11-27 20:17 - Updated: 2025-11-27 20:17{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for dovecot24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for dovecot24 fixes the following issues:\n\n- Update dovecot to 2.4.2:\n - CVE-2025-30189: Fixed users cached with same cache key when\n auth cache was enabled (bsc#1252839)\n - Changes\n - auth: Remove proxy_always field.\n - config: Change settings history parsing to use python3.\n - doveadm: Print table formatter - Print empty values as \"-\".\n - imapc: Propagate remote error codes properly.\n - lda: Default mail_home=$HOME environment if not using userdb\n lookup\n - lib-dcrypt: Salt for new version 2 keys has been increased to\n 16 bytes.\n - lib-dregex: Add libpcre2 based regular expression support to\n Dovecot, if the library is missing, disable all regular\n expressions. This adds libpcre2-32 as build dependency.\n - lib-oauth2: jwt - Allow nbf and iat to point 1 second into\n future.\n - lib: Replace libicu with our own unicode library. Removes\n libicu as build dependency.\n - login-common: If proxying fails due to remote having invalid\n SSL cert, don\u0027t reconnect.\n - New features\n - auth: Add ssl_client_cert_fp and ssl_client_cert_pubkey_fp\n fields\n - config: Add support for $SET:filter/path/setting.\n - config: Improve @group includes to work with overwriting\n their settings.\n - doveadm kick: Add support for kicking multiple usernames\n - doveadm mailbox status: Add support for deleted status item.\n - imap, imap-client: Add experimental partial IMAP4rev2\n support.\n - imap: Implement support for UTF8=ACCEPT for APPEND\n - lib-oauth2, oauth2: Add oauth2_token_expire_grace setting.\n - lmtp: lmtp-client - Support command pipelining.\n - login-common: Support local/remote blocks better.\n - master: accept() unix/inet connections before creating child\n process to handle it. This reduces timeouts when child\n processes are slow to spawn themselves.\n - Bug fixes\n - SMTPUTF8 was accepted even when it wasn\u0027t enabled.\n - auth, *-login: Direct logging with -L parameter was not\n working.\n - auth: Crash occured when OAUTH token validation failed with\n oauth2_use_worker_with_mech=yes.\n - auth: Invalid field handling crashes were fixed.\n - auth: ldap - Potential crash could happen at deinit.\n - auth: mech-gssapi - Server sending empty initial response\n would cause errors.\n - auth: mech-winbind - GSS-SPNEGO mechanism was erroneously\n marked as\n - not accepting NUL.\n - config: Multiple issues with $SET handling has been fixed.\n - configure: Building without LDAP didn\u0027t work.\n - doveadm: If source user didn\u0027t exist, a crash would occur.\n - imap, pop3, submission, imap-urlauth: USER environment usage\n was broken when running standalone.\n - imap-hibernate: Statistics would get truncated on\n unhibernation.\n - imap: \"SEARCH MIMEPART FILENAME ENDS\" command could have\n accessed memory outside allocated buffer, resulting in a\n crash.\n - imapc: Fetching partial headers would cause other cached\n headers to be cached empty, breaking e.g. imap envelope\n responses when caching to disk.\n - imapc: Shared namespace\u0027s INBOX mailbox was not always\n uppercased.\n - imapc: imapc_features=guid-forced GUID generation was not\n working correctly.\n - lda: USER environment was not accepted if -d hasn\u0027t been\n specified.\n - lib-http: http-url - Significant path percent encoding\n through parse and create was not preserved. This is mainly\n important for Dovecot\u0027s Lua bindings for lib-http.\n - lib-settings: Crash would occur when using %variables in\n SET_FILE type settings.\n - lib-storage: Attachment flags were attempted to be added for\n readonly mailboxes with mail_attachment_flags=add-flags.\n - lib-storage: Root directory for unusable shared namespaces\n was unnecessarily attempted to be created.\n - lib: Crash would occur when config was reloaded and logging\n to syslog.\n - login-common: Crash might have occured when login proxy was\n destroyed.\n - sqlite: The sqlite_journal_mode=wal setting didn\u0027t actually\n do anything.\n - Many other bugs have been fixed.\n- Update pigeonhole to 2.4.2\n - Changes\n - lib-sieve: Use new regular expression library in core.\n - managesieve: Add default\n service_extra_groups=$SET:default_internal_group.\n - New features\n - lib-sieve: Add support for \"extlists\" extension.\n - lib-sieve: regex - Allow unicode comparator.\n - Bug fixes\n - lib-sieve-tool: sieve-tool - All sieve_script settings were\n overriden.\n - lib-sieve: storage: dict: sieve_script_dict filter was\n missing from settings.\n - sieve-ldap-storage: Fix compile without LDAP.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-79",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_20113-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1252839",
"url": "https://bugzilla.suse.com/1252839"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-30189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-30189/"
}
],
"title": "Security update for dovecot24",
"tracking": {
"current_release_date": "2025-11-27T20:17:17Z",
"generator": {
"date": "2025-11-27T20:17:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:20113-1",
"initial_release_date": "2025-11-27T20:17:17Z",
"revision_history": [
{
"date": "2025-11-27T20:17:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-devel-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-devel-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-fts-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-fts-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-devel-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-fts-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-devel-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-devel-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-fts-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-fts-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-devel-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-devel-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-fts-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-fts-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-30189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-30189"
}
],
"notes": [
{
"category": "general",
"text": "When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers. No publicly available exploits are known.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-30189",
"url": "https://www.suse.com/security/cve/CVE-2025-30189"
},
{
"category": "external",
"summary": "SUSE Bug 1252839 for CVE-2025-30189",
"url": "https://bugzilla.suse.com/1252839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-27T20:17:17Z",
"details": "moderate"
}
],
"title": "CVE-2025-30189"
}
]
}
OPENSUSE-SU-2025-20113-1
Vulnerability from csaf_opensuse - Published: 2025-11-27 20:17 - Updated: 2025-11-27 20:17| URL | Category | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for dovecot24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for dovecot24 fixes the following issues:\n\n- Update dovecot to 2.4.2:\n - CVE-2025-30189: Fixed users cached with same cache key when\n auth cache was enabled (bsc#1252839)\n - Changes\n - auth: Remove proxy_always field.\n - config: Change settings history parsing to use python3.\n - doveadm: Print table formatter - Print empty values as \"-\".\n - imapc: Propagate remote error codes properly.\n - lda: Default mail_home=$HOME environment if not using userdb\n lookup\n - lib-dcrypt: Salt for new version 2 keys has been increased to\n 16 bytes.\n - lib-dregex: Add libpcre2 based regular expression support to\n Dovecot, if the library is missing, disable all regular\n expressions. This adds libpcre2-32 as build dependency.\n - lib-oauth2: jwt - Allow nbf and iat to point 1 second into\n future.\n - lib: Replace libicu with our own unicode library. Removes\n libicu as build dependency.\n - login-common: If proxying fails due to remote having invalid\n SSL cert, don\u0027t reconnect.\n - New features\n - auth: Add ssl_client_cert_fp and ssl_client_cert_pubkey_fp\n fields\n - config: Add support for $SET:filter/path/setting.\n - config: Improve @group includes to work with overwriting\n their settings.\n - doveadm kick: Add support for kicking multiple usernames\n - doveadm mailbox status: Add support for deleted status item.\n - imap, imap-client: Add experimental partial IMAP4rev2\n support.\n - imap: Implement support for UTF8=ACCEPT for APPEND\n - lib-oauth2, oauth2: Add oauth2_token_expire_grace setting.\n - lmtp: lmtp-client - Support command pipelining.\n - login-common: Support local/remote blocks better.\n - master: accept() unix/inet connections before creating child\n process to handle it. This reduces timeouts when child\n processes are slow to spawn themselves.\n - Bug fixes\n - SMTPUTF8 was accepted even when it wasn\u0027t enabled.\n - auth, *-login: Direct logging with -L parameter was not\n working.\n - auth: Crash occured when OAUTH token validation failed with\n oauth2_use_worker_with_mech=yes.\n - auth: Invalid field handling crashes were fixed.\n - auth: ldap - Potential crash could happen at deinit.\n - auth: mech-gssapi - Server sending empty initial response\n would cause errors.\n - auth: mech-winbind - GSS-SPNEGO mechanism was erroneously\n marked as\n - not accepting NUL.\n - config: Multiple issues with $SET handling has been fixed.\n - configure: Building without LDAP didn\u0027t work.\n - doveadm: If source user didn\u0027t exist, a crash would occur.\n - imap, pop3, submission, imap-urlauth: USER environment usage\n was broken when running standalone.\n - imap-hibernate: Statistics would get truncated on\n unhibernation.\n - imap: \"SEARCH MIMEPART FILENAME ENDS\" command could have\n accessed memory outside allocated buffer, resulting in a\n crash.\n - imapc: Fetching partial headers would cause other cached\n headers to be cached empty, breaking e.g. imap envelope\n responses when caching to disk.\n - imapc: Shared namespace\u0027s INBOX mailbox was not always\n uppercased.\n - imapc: imapc_features=guid-forced GUID generation was not\n working correctly.\n - lda: USER environment was not accepted if -d hasn\u0027t been\n specified.\n - lib-http: http-url - Significant path percent encoding\n through parse and create was not preserved. This is mainly\n important for Dovecot\u0027s Lua bindings for lib-http.\n - lib-settings: Crash would occur when using %variables in\n SET_FILE type settings.\n - lib-storage: Attachment flags were attempted to be added for\n readonly mailboxes with mail_attachment_flags=add-flags.\n - lib-storage: Root directory for unusable shared namespaces\n was unnecessarily attempted to be created.\n - lib: Crash would occur when config was reloaded and logging\n to syslog.\n - login-common: Crash might have occured when login proxy was\n destroyed.\n - sqlite: The sqlite_journal_mode=wal setting didn\u0027t actually\n do anything.\n - Many other bugs have been fixed.\n- Update pigeonhole to 2.4.2\n - Changes\n - lib-sieve: Use new regular expression library in core.\n - managesieve: Add default\n service_extra_groups=$SET:default_internal_group.\n - New features\n - lib-sieve: Add support for \"extlists\" extension.\n - lib-sieve: regex - Allow unicode comparator.\n - Bug fixes\n - lib-sieve-tool: sieve-tool - All sieve_script settings were\n overriden.\n - lib-sieve: storage: dict: sieve_script_dict filter was\n missing from settings.\n - sieve-ldap-storage: Fix compile without LDAP.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-79",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025-20113-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1252839",
"url": "https://bugzilla.suse.com/1252839"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-30189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-30189/"
}
],
"title": "Security update for dovecot24",
"tracking": {
"current_release_date": "2025-11-27T20:17:17Z",
"generator": {
"date": "2025-11-27T20:17:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025-20113-1",
"initial_release_date": "2025-11-27T20:17:17Z",
"revision_history": [
{
"date": "2025-11-27T20:17:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-devel-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-devel-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-fts-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-fts-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-devel-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-fts-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-devel-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-devel-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-fts-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-fts-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-devel-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-devel-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-fts-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-fts-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-30189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-30189"
}
],
"notes": [
{
"category": "general",
"text": "When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers. No publicly available exploits are known.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-30189",
"url": "https://www.suse.com/security/cve/CVE-2025-30189"
},
{
"category": "external",
"summary": "SUSE Bug 1252839 for CVE-2025-30189",
"url": "https://bugzilla.suse.com/1252839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-flatcurve-2.4.2-160000.1.1.x86_64",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"openSUSE Leap 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-27T20:17:17Z",
"details": "moderate"
}
],
"title": "CVE-2025-30189"
}
]
}
OPENSUSE-SU-2025:15676-1
Vulnerability from csaf_opensuse - Published: 2025-10-29 00:00 - Updated: 2025-10-29 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "dovecot24-2.4.2-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the dovecot24-2.4.2-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15676",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15676-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-30189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-30189/"
}
],
"title": "dovecot24-2.4.2-1.1 on GA media",
"tracking": {
"current_release_date": "2025-10-29T00:00:00Z",
"generator": {
"date": "2025-10-29T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15676-1",
"initial_release_date": "2025-10-29T00:00:00Z",
"revision_history": [
{
"date": "2025-10-29T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-1.1.aarch64",
"product": {
"name": "dovecot24-2.4.2-1.1.aarch64",
"product_id": "dovecot24-2.4.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-1.1.aarch64",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-1.1.aarch64",
"product_id": "dovecot24-backend-mysql-2.4.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-1.1.aarch64",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-1.1.aarch64",
"product_id": "dovecot24-backend-pgsql-2.4.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-1.1.aarch64",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-1.1.aarch64",
"product_id": "dovecot24-backend-sqlite-2.4.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-1.1.aarch64",
"product": {
"name": "dovecot24-devel-2.4.2-1.1.aarch64",
"product_id": "dovecot24-devel-2.4.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-1.1.aarch64",
"product": {
"name": "dovecot24-fts-2.4.2-1.1.aarch64",
"product_id": "dovecot24-fts-2.4.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-flatcurve-2.4.2-1.1.aarch64",
"product": {
"name": "dovecot24-fts-flatcurve-2.4.2-1.1.aarch64",
"product_id": "dovecot24-fts-flatcurve-2.4.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-1.1.aarch64",
"product": {
"name": "dovecot24-fts-solr-2.4.2-1.1.aarch64",
"product_id": "dovecot24-fts-solr-2.4.2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-1.1.ppc64le",
"product": {
"name": "dovecot24-2.4.2-1.1.ppc64le",
"product_id": "dovecot24-2.4.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-1.1.ppc64le",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-1.1.ppc64le",
"product_id": "dovecot24-backend-mysql-2.4.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-1.1.ppc64le",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-1.1.ppc64le",
"product_id": "dovecot24-backend-pgsql-2.4.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-1.1.ppc64le",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-1.1.ppc64le",
"product_id": "dovecot24-backend-sqlite-2.4.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-1.1.ppc64le",
"product": {
"name": "dovecot24-devel-2.4.2-1.1.ppc64le",
"product_id": "dovecot24-devel-2.4.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-1.1.ppc64le",
"product": {
"name": "dovecot24-fts-2.4.2-1.1.ppc64le",
"product_id": "dovecot24-fts-2.4.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-flatcurve-2.4.2-1.1.ppc64le",
"product": {
"name": "dovecot24-fts-flatcurve-2.4.2-1.1.ppc64le",
"product_id": "dovecot24-fts-flatcurve-2.4.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-1.1.ppc64le",
"product": {
"name": "dovecot24-fts-solr-2.4.2-1.1.ppc64le",
"product_id": "dovecot24-fts-solr-2.4.2-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-1.1.s390x",
"product": {
"name": "dovecot24-2.4.2-1.1.s390x",
"product_id": "dovecot24-2.4.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-1.1.s390x",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-1.1.s390x",
"product_id": "dovecot24-backend-mysql-2.4.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-1.1.s390x",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-1.1.s390x",
"product_id": "dovecot24-backend-pgsql-2.4.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-1.1.s390x",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-1.1.s390x",
"product_id": "dovecot24-backend-sqlite-2.4.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-1.1.s390x",
"product": {
"name": "dovecot24-devel-2.4.2-1.1.s390x",
"product_id": "dovecot24-devel-2.4.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-1.1.s390x",
"product": {
"name": "dovecot24-fts-2.4.2-1.1.s390x",
"product_id": "dovecot24-fts-2.4.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-flatcurve-2.4.2-1.1.s390x",
"product": {
"name": "dovecot24-fts-flatcurve-2.4.2-1.1.s390x",
"product_id": "dovecot24-fts-flatcurve-2.4.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-1.1.s390x",
"product": {
"name": "dovecot24-fts-solr-2.4.2-1.1.s390x",
"product_id": "dovecot24-fts-solr-2.4.2-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-1.1.x86_64",
"product": {
"name": "dovecot24-2.4.2-1.1.x86_64",
"product_id": "dovecot24-2.4.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-1.1.x86_64",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-1.1.x86_64",
"product_id": "dovecot24-backend-mysql-2.4.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-1.1.x86_64",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-1.1.x86_64",
"product_id": "dovecot24-backend-pgsql-2.4.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-1.1.x86_64",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-1.1.x86_64",
"product_id": "dovecot24-backend-sqlite-2.4.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-1.1.x86_64",
"product": {
"name": "dovecot24-devel-2.4.2-1.1.x86_64",
"product_id": "dovecot24-devel-2.4.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-1.1.x86_64",
"product": {
"name": "dovecot24-fts-2.4.2-1.1.x86_64",
"product_id": "dovecot24-fts-2.4.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-flatcurve-2.4.2-1.1.x86_64",
"product": {
"name": "dovecot24-fts-flatcurve-2.4.2-1.1.x86_64",
"product_id": "dovecot24-fts-flatcurve-2.4.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-1.1.x86_64",
"product": {
"name": "dovecot24-fts-solr-2.4.2-1.1.x86_64",
"product_id": "dovecot24-fts-solr-2.4.2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-2.4.2-1.1.aarch64"
},
"product_reference": "dovecot24-2.4.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-2.4.2-1.1.ppc64le"
},
"product_reference": "dovecot24-2.4.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-2.4.2-1.1.s390x"
},
"product_reference": "dovecot24-2.4.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-2.4.2-1.1.x86_64"
},
"product_reference": "dovecot24-2.4.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.aarch64"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.ppc64le"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.s390x"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.x86_64"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.aarch64"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.ppc64le"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.s390x"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.x86_64"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.aarch64"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.ppc64le"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.s390x"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.x86_64"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.aarch64"
},
"product_reference": "dovecot24-devel-2.4.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.ppc64le"
},
"product_reference": "dovecot24-devel-2.4.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.s390x"
},
"product_reference": "dovecot24-devel-2.4.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.x86_64"
},
"product_reference": "dovecot24-devel-2.4.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.aarch64"
},
"product_reference": "dovecot24-fts-2.4.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.ppc64le"
},
"product_reference": "dovecot24-fts-2.4.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.s390x"
},
"product_reference": "dovecot24-fts-2.4.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.x86_64"
},
"product_reference": "dovecot24-fts-2.4.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-flatcurve-2.4.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.aarch64"
},
"product_reference": "dovecot24-fts-flatcurve-2.4.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-flatcurve-2.4.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.ppc64le"
},
"product_reference": "dovecot24-fts-flatcurve-2.4.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-flatcurve-2.4.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.s390x"
},
"product_reference": "dovecot24-fts-flatcurve-2.4.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-flatcurve-2.4.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.x86_64"
},
"product_reference": "dovecot24-fts-flatcurve-2.4.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.aarch64"
},
"product_reference": "dovecot24-fts-solr-2.4.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.ppc64le"
},
"product_reference": "dovecot24-fts-solr-2.4.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.s390x"
},
"product_reference": "dovecot24-fts-solr-2.4.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.x86_64"
},
"product_reference": "dovecot24-fts-solr-2.4.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-30189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-30189"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dovecot24-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-30189",
"url": "https://www.suse.com/security/cve/CVE-2025-30189"
},
{
"category": "external",
"summary": "SUSE Bug 1252839 for CVE-2025-30189",
"url": "https://bugzilla.suse.com/1252839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dovecot24-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:dovecot24-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-devel-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-fts-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.2-1.1.x86_64",
"openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.aarch64",
"openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.ppc64le",
"openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.s390x",
"openSUSE Tumbleweed:dovecot24-fts-solr-2.4.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-29T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-30189"
}
]
}
GHSA-396V-898V-98HG
Vulnerability from github – Published: 2025-10-31 09:30 – Updated: 2026-03-27 09:31When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers. No publicly available exploits are known.
{
"affected": [],
"aliases": [
"CVE-2025-30189"
],
"database_specific": {
"cwe_ids": [
"CWE-1250"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-31T09:15:47Z",
"severity": "HIGH"
},
"details": "When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers. No publicly available exploits are known.",
"id": "GHSA-396v-898v-98hg",
"modified": "2026-03-27T09:31:17Z",
"published": "2025-10-31T09:30:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30189"
},
{
"type": "WEB",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2025/oxdc-adv-2025-0001.json"
},
{
"type": "WEB",
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0001.json"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2025/Oct/29"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/10/29/4"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
]
}
SUSE-SU-2025:21159-1
Vulnerability from csaf_suse - Published: 2025-11-27 20:19 - Updated: 2025-11-27 20:19| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for dovecot24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for dovecot24 fixes the following issues:\n\n- Update dovecot to 2.4.2:\n - CVE-2025-30189: Fixed users cached with same cache key when\n auth cache was enabled (bsc#1252839)\n - Changes\n - auth: Remove proxy_always field.\n - config: Change settings history parsing to use python3.\n - doveadm: Print table formatter - Print empty values as \"-\".\n - imapc: Propagate remote error codes properly.\n - lda: Default mail_home=$HOME environment if not using userdb\n lookup\n - lib-dcrypt: Salt for new version 2 keys has been increased to\n 16 bytes.\n - lib-dregex: Add libpcre2 based regular expression support to\n Dovecot, if the library is missing, disable all regular\n expressions. This adds libpcre2-32 as build dependency.\n - lib-oauth2: jwt - Allow nbf and iat to point 1 second into\n future.\n - lib: Replace libicu with our own unicode library. Removes\n libicu as build dependency.\n - login-common: If proxying fails due to remote having invalid\n SSL cert, don\u0027t reconnect.\n - New features\n - auth: Add ssl_client_cert_fp and ssl_client_cert_pubkey_fp\n fields\n - config: Add support for $SET:filter/path/setting.\n - config: Improve @group includes to work with overwriting\n their settings.\n - doveadm kick: Add support for kicking multiple usernames\n - doveadm mailbox status: Add support for deleted status item.\n - imap, imap-client: Add experimental partial IMAP4rev2\n support.\n - imap: Implement support for UTF8=ACCEPT for APPEND\n - lib-oauth2, oauth2: Add oauth2_token_expire_grace setting.\n - lmtp: lmtp-client - Support command pipelining.\n - login-common: Support local/remote blocks better.\n - master: accept() unix/inet connections before creating child\n process to handle it. This reduces timeouts when child\n processes are slow to spawn themselves.\n - Bug fixes\n - SMTPUTF8 was accepted even when it wasn\u0027t enabled.\n - auth, *-login: Direct logging with -L parameter was not\n working.\n - auth: Crash occured when OAUTH token validation failed with\n oauth2_use_worker_with_mech=yes.\n - auth: Invalid field handling crashes were fixed.\n - auth: ldap - Potential crash could happen at deinit.\n - auth: mech-gssapi - Server sending empty initial response\n would cause errors.\n - auth: mech-winbind - GSS-SPNEGO mechanism was erroneously\n marked as\n - not accepting NUL.\n - config: Multiple issues with $SET handling has been fixed.\n - configure: Building without LDAP didn\u0027t work.\n - doveadm: If source user didn\u0027t exist, a crash would occur.\n - imap, pop3, submission, imap-urlauth: USER environment usage\n was broken when running standalone.\n - imap-hibernate: Statistics would get truncated on\n unhibernation.\n - imap: \"SEARCH MIMEPART FILENAME ENDS\" command could have\n accessed memory outside allocated buffer, resulting in a\n crash.\n - imapc: Fetching partial headers would cause other cached\n headers to be cached empty, breaking e.g. imap envelope\n responses when caching to disk.\n - imapc: Shared namespace\u0027s INBOX mailbox was not always\n uppercased.\n - imapc: imapc_features=guid-forced GUID generation was not\n working correctly.\n - lda: USER environment was not accepted if -d hasn\u0027t been\n specified.\n - lib-http: http-url - Significant path percent encoding\n through parse and create was not preserved. This is mainly\n important for Dovecot\u0027s Lua bindings for lib-http.\n - lib-settings: Crash would occur when using %variables in\n SET_FILE type settings.\n - lib-storage: Attachment flags were attempted to be added for\n readonly mailboxes with mail_attachment_flags=add-flags.\n - lib-storage: Root directory for unusable shared namespaces\n was unnecessarily attempted to be created.\n - lib: Crash would occur when config was reloaded and logging\n to syslog.\n - login-common: Crash might have occured when login proxy was\n destroyed.\n - sqlite: The sqlite_journal_mode=wal setting didn\u0027t actually\n do anything.\n - Many other bugs have been fixed.\n- Update pigeonhole to 2.4.2\n - Changes\n - lib-sieve: Use new regular expression library in core.\n - managesieve: Add default\n service_extra_groups=$SET:default_internal_group.\n - New features\n - lib-sieve: Add support for \"extlists\" extension.\n - lib-sieve: regex - Allow unicode comparator.\n - Bug fixes\n - lib-sieve-tool: sieve-tool - All sieve_script settings were\n overriden.\n - lib-sieve: storage: dict: sieve_script_dict filter was\n missing from settings.\n - sieve-ldap-storage: Fix compile without LDAP.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-79",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_21159-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:21159-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202521159-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:21159-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023506.html"
},
{
"category": "self",
"summary": "SUSE Bug 1252839",
"url": "https://bugzilla.suse.com/1252839"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-30189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-30189/"
}
],
"title": "Security update for dovecot24",
"tracking": {
"current_release_date": "2025-11-27T20:19:42Z",
"generator": {
"date": "2025-11-27T20:19:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:21159-1",
"initial_release_date": "2025-11-27T20:19:42Z",
"revision_history": [
{
"date": "2025-11-27T20:19:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-devel-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-devel-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-fts-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-fts-2.4.2-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"product": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"product_id": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-devel-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-fts-2.4.2-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"product": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"product_id": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-devel-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-devel-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-fts-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-fts-2.4.2-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"product": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"product_id": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dovecot24-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-devel-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-devel-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-devel-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-fts-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-fts-2.4.2-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64",
"product": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64",
"product_id": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-2.4.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-devel-2.4.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-devel-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-2.4.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-fts-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
},
"product_reference": "dovecot24-fts-solr-2.4.2-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-30189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-30189"
}
],
"notes": [
{
"category": "general",
"text": "When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers. No publicly available exploits are known.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-30189",
"url": "https://www.suse.com/security/cve/CVE-2025-30189"
},
{
"category": "external",
"summary": "SUSE Bug 1252839 for CVE-2025-30189",
"url": "https://bugzilla.suse.com/1252839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-27T20:19:42Z",
"details": "moderate"
}
],
"title": "CVE-2025-30189"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.