UBUNTU-CVE-2026-0394

Source
https://ubuntu.com/security/CVE-2026-0394
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-0394.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-0394
Upstream
  • CVE-2026-0394
Related
Published
2026-03-27T00:00:00Z
Modified
2026-04-22T16:17:33.093805Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

When dovecot has been configured to use per-domain passwd files, and they are placed one path component above /etc, or slash has been added to allowed characters, path traversal can happen if the domain component is directory partial. This allows inadvertently reading /etc/passwd (or some other path which ends with passwd). If this file contains passwords, it can be used to authenticate wrongly, or if this is userdb, it can unexpectly make system users appear valid users. Upgrade to fixed version, or use different authentication scheme that does not rely on paths. Alternatively you can also ensure that the per-domain passwd files are in some other location, such as /etc/dovecot/auth/%d. No publicly available exploits are known.

References

Affected packages

Ubuntu:16.04:LTS
dovecot

Package

Name
dovecot
Purl
pkg:deb/ubuntu/dovecot@1:2.2.22-1ubuntu2.14?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:2.*
1:2.2.18-2ubuntu2
1:2.2.22-1ubuntu1
1:2.2.22-1ubuntu2
1:2.2.22-1ubuntu2.1
1:2.2.22-1ubuntu2.2
1:2.2.22-1ubuntu2.3
1:2.2.22-1ubuntu2.4
1:2.2.22-1ubuntu2.6
1:2.2.22-1ubuntu2.7
1:2.2.22-1ubuntu2.8
1:2.2.22-1ubuntu2.9
1:2.2.22-1ubuntu2.10
1:2.2.22-1ubuntu2.11
1:2.2.22-1ubuntu2.12
1:2.2.22-1ubuntu2.13
1:2.2.22-1ubuntu2.14

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "dovecot-core",
            "binary_version": "1:2.2.22-1ubuntu2.14"
        },
        {
            "binary_name": "dovecot-gssapi",
            "binary_version": "1:2.2.22-1ubuntu2.14"
        },
        {
            "binary_name": "dovecot-imapd",
            "binary_version": "1:2.2.22-1ubuntu2.14"
        },
        {
            "binary_name": "dovecot-ldap",
            "binary_version": "1:2.2.22-1ubuntu2.14"
        },
        {
            "binary_name": "dovecot-lmtpd",
            "binary_version": "1:2.2.22-1ubuntu2.14"
        },
        {
            "binary_name": "dovecot-lucene",
            "binary_version": "1:2.2.22-1ubuntu2.14"
        },
        {
            "binary_name": "dovecot-managesieved",
            "binary_version": "1:2.2.22-1ubuntu2.14"
        },
        {
            "binary_name": "dovecot-mysql",
            "binary_version": "1:2.2.22-1ubuntu2.14"
        },
        {
            "binary_name": "dovecot-pgsql",
            "binary_version": "1:2.2.22-1ubuntu2.14"
        },
        {
            "binary_name": "dovecot-pop3d",
            "binary_version": "1:2.2.22-1ubuntu2.14"
        },
        {
            "binary_name": "dovecot-sieve",
            "binary_version": "1:2.2.22-1ubuntu2.14"
        },
        {
            "binary_name": "dovecot-solr",
            "binary_version": "1:2.2.22-1ubuntu2.14"
        },
        {
            "binary_name": "dovecot-sqlite",
            "binary_version": "1:2.2.22-1ubuntu2.14"
        },
        {
            "binary_name": "mail-stack-delivery",
            "binary_version": "1:2.2.22-1ubuntu2.14"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-0394.json"
Ubuntu:18.04:LTS
dovecot

Package

Name
dovecot
Purl
pkg:deb/ubuntu/dovecot@1:2.2.33.2-1ubuntu4.8?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:2.*
1:2.2.27-3ubuntu1
1:2.2.33.2-1ubuntu1
1:2.2.33.2-1ubuntu2
1:2.2.33.2-1ubuntu3
1:2.2.33.2-1ubuntu4
1:2.2.33.2-1ubuntu4.1
1:2.2.33.2-1ubuntu4.2
1:2.2.33.2-1ubuntu4.3
1:2.2.33.2-1ubuntu4.4
1:2.2.33.2-1ubuntu4.5
1:2.2.33.2-1ubuntu4.6
1:2.2.33.2-1ubuntu4.7
1:2.2.33.2-1ubuntu4.8

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "dovecot-core",
            "binary_version": "1:2.2.33.2-1ubuntu4.8"
        },
        {
            "binary_name": "dovecot-gssapi",
            "binary_version": "1:2.2.33.2-1ubuntu4.8"
        },
        {
            "binary_name": "dovecot-imapd",
            "binary_version": "1:2.2.33.2-1ubuntu4.8"
        },
        {
            "binary_name": "dovecot-ldap",
            "binary_version": "1:2.2.33.2-1ubuntu4.8"
        },
        {
            "binary_name": "dovecot-lmtpd",
            "binary_version": "1:2.2.33.2-1ubuntu4.8"
        },
        {
            "binary_name": "dovecot-managesieved",
            "binary_version": "1:2.2.33.2-1ubuntu4.8"
        },
        {
            "binary_name": "dovecot-mysql",
            "binary_version": "1:2.2.33.2-1ubuntu4.8"
        },
        {
            "binary_name": "dovecot-pgsql",
            "binary_version": "1:2.2.33.2-1ubuntu4.8"
        },
        {
            "binary_name": "dovecot-pop3d",
            "binary_version": "1:2.2.33.2-1ubuntu4.8"
        },
        {
            "binary_name": "dovecot-sieve",
            "binary_version": "1:2.2.33.2-1ubuntu4.8"
        },
        {
            "binary_name": "dovecot-solr",
            "binary_version": "1:2.2.33.2-1ubuntu4.8"
        },
        {
            "binary_name": "dovecot-sqlite",
            "binary_version": "1:2.2.33.2-1ubuntu4.8"
        },
        {
            "binary_name": "mail-stack-delivery",
            "binary_version": "1:2.2.33.2-1ubuntu4.8"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-0394.json"
Ubuntu:20.04:LTS
dovecot

Package

Name
dovecot
Purl
pkg:deb/ubuntu/dovecot@1:2.3.7.2-1ubuntu3.7?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:2.*
1:2.3.4.1-5ubuntu3
1:2.3.7.2-1ubuntu1
1:2.3.7.2-1ubuntu2
1:2.3.7.2-1ubuntu3
1:2.3.7.2-1ubuntu3.1
1:2.3.7.2-1ubuntu3.2
1:2.3.7.2-1ubuntu3.3
1:2.3.7.2-1ubuntu3.4
1:2.3.7.2-1ubuntu3.5
1:2.3.7.2-1ubuntu3.6
1:2.3.7.2-1ubuntu3.7

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "dovecot-auth-lua",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "dovecot-core",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "dovecot-gssapi",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "dovecot-imapd",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "dovecot-ldap",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "dovecot-lmtpd",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "dovecot-lucene",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "dovecot-managesieved",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "dovecot-mysql",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "dovecot-pgsql",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "dovecot-pop3d",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "dovecot-sieve",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "dovecot-solr",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "dovecot-sqlite",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "dovecot-submissiond",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        },
        {
            "binary_name": "mail-stack-delivery",
            "binary_version": "1:2.3.7.2-1ubuntu3.7"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-0394.json"
Ubuntu:22.04:LTS
dovecot

Package

Name
dovecot
Purl
pkg:deb/ubuntu/dovecot@1:2.3.16+dfsg1-3ubuntu2.7?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.3.16+dfsg1-3ubuntu2.7

Affected versions

1:2.*
1:2.3.13+dfsg1-1ubuntu3
1:2.3.16+dfsg1-3ubuntu1
1:2.3.16+dfsg1-3ubuntu2
1:2.3.16+dfsg1-3ubuntu2.1
1:2.3.16+dfsg1-3ubuntu2.2
1:2.3.16+dfsg1-3ubuntu2.4
1:2.3.16+dfsg1-3ubuntu2.6

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "dovecot-auth-lua",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-core",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-gssapi",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-imapd",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-ldap",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-lmtpd",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-lucene",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-managesieved",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-mysql",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-pgsql",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-pop3d",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-sieve",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-solr",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-sqlite",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-submissiond",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-0394.json"
Ubuntu:24.04:LTS
dovecot

Package

Name
dovecot
Purl
pkg:deb/ubuntu/dovecot@1:2.3.21+dfsg1-2ubuntu6.3?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.3.21+dfsg1-2ubuntu6.3

Affected versions

1:2.*
1:2.3.20+dfsg1-1ubuntu3
1:2.3.21+dfsg1-2ubuntu1
1:2.3.21+dfsg1-2ubuntu2
1:2.3.21+dfsg1-2ubuntu4
1:2.3.21+dfsg1-2ubuntu5
1:2.3.21+dfsg1-2ubuntu6
1:2.3.21+dfsg1-2ubuntu6.1
1:2.3.21+dfsg1-2ubuntu6.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "dovecot-auth-lua",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-core",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-gssapi",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-imapd",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-ldap",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-lmtpd",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-managesieved",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-mysql",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-pgsql",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-pop3d",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-sieve",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-solr",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-sqlite",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-submissiond",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-0394.json"
Ubuntu:Pro:14.04:LTS
dovecot

Package

Name
dovecot
Purl
pkg:deb/ubuntu/dovecot@1:2.2.9-1ubuntu2.6+esm4?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:2.*
1:2.1.7-7ubuntu3
1:2.2.9-1ubuntu1
1:2.2.9-1ubuntu2
1:2.2.9-1ubuntu2.1
1:2.2.9-1ubuntu2.3
1:2.2.9-1ubuntu2.4
1:2.2.9-1ubuntu2.5
1:2.2.9-1ubuntu2.6
1:2.2.9-1ubuntu2.6+esm1
1:2.2.9-1ubuntu2.6+esm2
1:2.2.9-1ubuntu2.6+esm3
1:2.2.9-1ubuntu2.6+esm4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "dovecot-core",
            "binary_version": "1:2.2.9-1ubuntu2.6+esm4"
        },
        {
            "binary_name": "dovecot-gssapi",
            "binary_version": "1:2.2.9-1ubuntu2.6+esm4"
        },
        {
            "binary_name": "dovecot-imapd",
            "binary_version": "1:2.2.9-1ubuntu2.6+esm4"
        },
        {
            "binary_name": "dovecot-ldap",
            "binary_version": "1:2.2.9-1ubuntu2.6+esm4"
        },
        {
            "binary_name": "dovecot-lmtpd",
            "binary_version": "1:2.2.9-1ubuntu2.6+esm4"
        },
        {
            "binary_name": "dovecot-managesieved",
            "binary_version": "1:2.2.9-1ubuntu2.6+esm4"
        },
        {
            "binary_name": "dovecot-mysql",
            "binary_version": "1:2.2.9-1ubuntu2.6+esm4"
        },
        {
            "binary_name": "dovecot-pgsql",
            "binary_version": "1:2.2.9-1ubuntu2.6+esm4"
        },
        {
            "binary_name": "dovecot-pop3d",
            "binary_version": "1:2.2.9-1ubuntu2.6+esm4"
        },
        {
            "binary_name": "dovecot-sieve",
            "binary_version": "1:2.2.9-1ubuntu2.6+esm4"
        },
        {
            "binary_name": "dovecot-solr",
            "binary_version": "1:2.2.9-1ubuntu2.6+esm4"
        },
        {
            "binary_name": "dovecot-sqlite",
            "binary_version": "1:2.2.9-1ubuntu2.6+esm4"
        },
        {
            "binary_name": "mail-stack-delivery",
            "binary_version": "1:2.2.9-1ubuntu2.6+esm4"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-0394.json"