USN-8136-1

Source
https://ubuntu.com/security/notices/USN-8136-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8136-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-8136-1
Upstream
Related
Published
2026-03-31T09:48:59Z
Modified
2026-04-24T10:17:24.874769179Z
Summary
dovecot vulnerabilities
Details

It was discovered that Dovecot incorrectly handled invalid base64 SASL data. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 25.10. (CVE-2025-59028)

It was discovered that Dovecot script decode2text.sh incorrectly handled zip files. An attacker could possibly use this issue to obtain sensitive information. (CVE-2025-59031)

It was discovered that Dovecot incorrectly handled certain AUTHENTICATE requests. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-59032)

It was discovered that Dovecot incorrectly handled certain SQL based authentication. An attacker could possibly use this issue to bypass authentication. This issue only affected Ubuntu 25.10. (CVE-2026-24031)

It was discovered that Dovecot incorrectly handled certain LDAP based authentication. An attacker could possibly use this issue to bypass restrictions and allow probing of LDAP structure. This issue only affected Ubuntu 25.10. (CVE-2026-27860)

It was discovered that Dovecot is vulnerable to replay attack under certain conditions. An attacker could possibly use this issue to bypass authentication. (CVE-2026-27855)

It was discovered that Dovecot is vulnerable to a timing attack under certain conditions. An attacker could possibly use this issue to bypass authentication. (CVE-2026-27856)

It was discovered that Dovecot incorrectly handled certain IMAP login requests. An attacker could possibly use this issue to cause a denial of service. (CVE-2026-27857)

It was discovered that Dovecot incorrectly handled certain specially crafted messages. An attacker could possibly use this issue to cause a denial of service. (CVE-2026-27858)

It was discovered that Dovecot incorrectly handled certain specially crafted mail messages. An attacker could possibly use this issue to cause a denial of service. (CVE-2026-27859)

It was discovered that Dovecot incorrectly handles file paths. A attacker could possibly use this issue to perform a path traversal and obtain or modify arbitrary files. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2026-0394)

References

Affected packages

Ubuntu:22.04:LTS / dovecot

Package

Name
dovecot
Purl
pkg:deb/ubuntu/dovecot@1:2.3.16+dfsg1-3ubuntu2.7?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.3.16+dfsg1-3ubuntu2.7

Affected versions

1:2.*
1:2.3.13+dfsg1-1ubuntu3
1:2.3.16+dfsg1-3ubuntu1
1:2.3.16+dfsg1-3ubuntu2
1:2.3.16+dfsg1-3ubuntu2.1
1:2.3.16+dfsg1-3ubuntu2.2
1:2.3.16+dfsg1-3ubuntu2.4
1:2.3.16+dfsg1-3ubuntu2.6

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "dovecot-auth-lua",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-core",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-gssapi",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-imapd",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-ldap",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-lmtpd",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-lucene",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-managesieved",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-mysql",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-pgsql",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-pop3d",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-sieve",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-solr",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-sqlite",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        },
        {
            "binary_name": "dovecot-submissiond",
            "binary_version": "1:2.3.16+dfsg1-3ubuntu2.7"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:22.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8136-1.json"

Ubuntu:24.04:LTS / dovecot

Package

Name
dovecot
Purl
pkg:deb/ubuntu/dovecot@1:2.3.21+dfsg1-2ubuntu6.3?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.3.21+dfsg1-2ubuntu6.3

Affected versions

1:2.*
1:2.3.20+dfsg1-1ubuntu3
1:2.3.21+dfsg1-2ubuntu1
1:2.3.21+dfsg1-2ubuntu2
1:2.3.21+dfsg1-2ubuntu4
1:2.3.21+dfsg1-2ubuntu5
1:2.3.21+dfsg1-2ubuntu6
1:2.3.21+dfsg1-2ubuntu6.1
1:2.3.21+dfsg1-2ubuntu6.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "dovecot-auth-lua",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-core",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-gssapi",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-imapd",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-ldap",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-lmtpd",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-managesieved",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-mysql",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-pgsql",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-pop3d",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-sieve",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-solr",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-sqlite",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        },
        {
            "binary_name": "dovecot-submissiond",
            "binary_version": "1:2.3.21+dfsg1-2ubuntu6.3"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:24.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8136-1.json"

Ubuntu:25.10 / dovecot

Package

Name
dovecot
Purl
pkg:deb/ubuntu/dovecot@1:2.4.1+dfsg1-5ubuntu4.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.4.1+dfsg1-5ubuntu4.1

Affected versions

1:2.*
1:2.3.21.1+dfsg1-1ubuntu2
1:2.4.1+dfsg1-5ubuntu1
1:2.4.1+dfsg1-5ubuntu3
1:2.4.1+dfsg1-5ubuntu4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "dovecot-auth-lua",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        },
        {
            "binary_name": "dovecot-core",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        },
        {
            "binary_name": "dovecot-flatcurve",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        },
        {
            "binary_name": "dovecot-gssapi",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        },
        {
            "binary_name": "dovecot-imapd",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        },
        {
            "binary_name": "dovecot-ldap",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        },
        {
            "binary_name": "dovecot-lmtpd",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        },
        {
            "binary_name": "dovecot-managesieved",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        },
        {
            "binary_name": "dovecot-mysql",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        },
        {
            "binary_name": "dovecot-pgsql",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        },
        {
            "binary_name": "dovecot-pop3d",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        },
        {
            "binary_name": "dovecot-sieve",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        },
        {
            "binary_name": "dovecot-solr",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        },
        {
            "binary_name": "dovecot-sqlite",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        },
        {
            "binary_name": "dovecot-submissiond",
            "binary_version": "1:2.4.1+dfsg1-5ubuntu4.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:25.10",
    "cves": [
        {
            "id": "CVE-2025-59028",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2026-24031",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        },
        {
            "id": "CVE-2026-27860",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8136-1.json"