DEBIAN-CVE-2026-24031

Source
https://security-tracker.debian.org/tracker/CVE-2026-24031
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24031.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-24031
Upstream
  • CVE-2026-24031
Published
2026-03-27T09:16:19.447Z
Modified
2026-04-17T05:00:20.862729Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L CVSS Calculator
Summary
[none]
Details

Dovecot SQL based authentication can be bypassed when authusernamechars is cleared by admin. This vulnerability allows bypassing authentication for any user and user enumeration. Do not clear authusernamechars. If this is not possible, install latest fixed version. No publicly available exploits are known.

References

Affected packages

Debian:13 / dovecot

Package

Name
dovecot
Purl
pkg:deb/debian/dovecot?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.4.1+dfsg1-6+deb13u4

Affected versions

1:2.*
1:2.4.1+dfsg1-6
1:2.4.1+dfsg1-6+deb13u1
1:2.4.1+dfsg1-6+deb13u2
1:2.4.1+dfsg1-6+deb13u3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24031.json"

Debian:14 / dovecot

Package

Name
dovecot
Purl
pkg:deb/debian/dovecot?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.4.3+dfsg1-1

Affected versions

1:2.*
1:2.4.1+dfsg1-6
1:2.4.1+dfsg1-7
1:2.4.1+dfsg1-8
1:2.4.1+dfsg1-9
1:2.4.2+dfsg1-1
1:2.4.2+dfsg1-2
1:2.4.2+dfsg1-3
1:2.4.2+dfsg1-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24031.json"