DEBIAN-CVE-2026-0394

Source
https://security-tracker.debian.org/tracker/CVE-2026-0394
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-0394.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-0394
Upstream
  • CVE-2026-0394
Published
2026-03-27T09:16:19.283Z
Modified
2026-04-05T18:00:59.884822Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

When dovecot has been configured to use per-domain passwd files, and they are placed one path component above /etc, or slash has been added to allowed characters, path traversal can happen if the domain component is directory partial. This allows inadvertently reading /etc/passwd (or some other path which ends with passwd). If this file contains passwords, it can be used to authenticate wrongly, or if this is userdb, it can unexpectly make system users appear valid users. Upgrade to fixed version, or use different authentication scheme that does not rely on paths. Alternatively you can also ensure that the per-domain passwd files are in some other location, such as /etc/dovecot/auth/%d. No publicly available exploits are known.

References

Affected packages

Debian:11 / dovecot

Package

Name
dovecot
Purl
pkg:deb/debian/dovecot?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:2.*
1:2.3.13+dfsg1-2
1:2.3.13+dfsg1-2+deb11u1
1:2.3.13+dfsg1-2+deb11u2
1:2.3.16+dfsg1-1
1:2.3.16+dfsg1-2
1:2.3.16+dfsg1-3
1:2.3.17.1+dfsg1-1
1:2.3.18+dfsg1-1
1:2.3.19+dfsg1-1
1:2.3.19.1+dfsg1-1
1:2.3.19.1+dfsg1-2
1:2.3.19.1+dfsg1-2.1
1:2.3.20+dfsg1-1
1:2.3.21+dfsg1-1
1:2.3.21+dfsg1-2
1:2.3.21+dfsg1-3~bpo12+1
1:2.3.21+dfsg1-3
1:2.3.21.1+dfsg1-1~bpo12+1
1:2.3.21.1+dfsg1-1
1:2.4.0+dfsg1-1~exp1
1:2.4.0+dfsg1-1~exp2
1:2.4.0+dfsg1-1~exp3
1:2.4.0+dfsg1-1~exp4
1:2.4.0+dfsg1-1~exp5
1:2.4.0+dfsg1-1~exp6
1:2.4.1+dfsg1-1~exp1
1:2.4.1+dfsg1-1~exp2
1:2.4.1+dfsg1-1
1:2.4.1+dfsg1-2
1:2.4.1+dfsg1-3
1:2.4.1+dfsg1-4
1:2.4.1+dfsg1-5
1:2.4.1+dfsg1-6~exp1
1:2.4.1+dfsg1-6
1:2.4.1+dfsg1-7
1:2.4.1+dfsg1-8
1:2.4.1+dfsg1-9
1:2.4.2+dfsg1-1
1:2.4.2+dfsg1-2
1:2.4.2+dfsg1-3
1:2.4.2+dfsg1-4
1:2.4.3+dfsg1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-0394.json"

Debian:12 / dovecot

Package

Name
dovecot
Purl
pkg:deb/debian/dovecot?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.3.19.1+dfsg1-2.1+deb12u2

Affected versions

1:2.*
1:2.3.19.1+dfsg1-2.1
1:2.3.19.1+dfsg1-2.1+deb12u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-0394.json"

Debian:13 / dovecot

Package

Name
dovecot
Purl
pkg:deb/debian/dovecot?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.4.1+dfsg1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-0394.json"

Debian:14 / dovecot

Package

Name
dovecot
Purl
pkg:deb/debian/dovecot?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.4.1+dfsg1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-0394.json"