<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">dovecot23-2.3.21.1-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:14274-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-08-20T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-08-20T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-08-20T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">dovecot23-2.3.21.1-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the dovecot23-2.3.21.1-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-14274</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-23184/</URL>
      <Description>SUSE CVE CVE-2024-23184 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-23185/</URL>
      <Description>SUSE CVE CVE-2024-23185 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="dovecot23-2.3.21.1-1.1">
      <FullProductName ProductID="dovecot23-2.3.21.1-1.1">dovecot23-2.3.21.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot23-backend-mysql-2.3.21.1-1.1">
      <FullProductName ProductID="dovecot23-backend-mysql-2.3.21.1-1.1">dovecot23-backend-mysql-2.3.21.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot23-backend-pgsql-2.3.21.1-1.1">
      <FullProductName ProductID="dovecot23-backend-pgsql-2.3.21.1-1.1">dovecot23-backend-pgsql-2.3.21.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot23-backend-sqlite-2.3.21.1-1.1">
      <FullProductName ProductID="dovecot23-backend-sqlite-2.3.21.1-1.1">dovecot23-backend-sqlite-2.3.21.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot23-devel-2.3.21.1-1.1">
      <FullProductName ProductID="dovecot23-devel-2.3.21.1-1.1">dovecot23-devel-2.3.21.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot23-fts-2.3.21.1-1.1">
      <FullProductName ProductID="dovecot23-fts-2.3.21.1-1.1">dovecot23-fts-2.3.21.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot23-fts-lucene-2.3.21.1-1.1">
      <FullProductName ProductID="dovecot23-fts-lucene-2.3.21.1-1.1">dovecot23-fts-lucene-2.3.21.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot23-fts-solr-2.3.21.1-1.1">
      <FullProductName ProductID="dovecot23-fts-solr-2.3.21.1-1.1">dovecot23-fts-solr-2.3.21.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot23-fts-squat-2.3.21.1-1.1">
      <FullProductName ProductID="dovecot23-fts-squat-2.3.21.1-1.1">dovecot23-fts-squat-2.3.21.1-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="dovecot23-2.3.21.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot23-2.3.21.1-1.1">dovecot23-2.3.21.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot23-backend-mysql-2.3.21.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.21.1-1.1">dovecot23-backend-mysql-2.3.21.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot23-backend-pgsql-2.3.21.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.21.1-1.1">dovecot23-backend-pgsql-2.3.21.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot23-backend-sqlite-2.3.21.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.21.1-1.1">dovecot23-backend-sqlite-2.3.21.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot23-devel-2.3.21.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot23-devel-2.3.21.1-1.1">dovecot23-devel-2.3.21.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot23-fts-2.3.21.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot23-fts-2.3.21.1-1.1">dovecot23-fts-2.3.21.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot23-fts-lucene-2.3.21.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.21.1-1.1">dovecot23-fts-lucene-2.3.21.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot23-fts-solr-2.3.21.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot23-fts-solr-2.3.21.1-1.1">dovecot23-fts-solr-2.3.21.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot23-fts-squat-2.3.21.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot23-fts-squat-2.3.21.1-1.1">dovecot23-fts-squat-2.3.21.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Having a large number of address headers (From, To, Cc, Bcc, etc.) becomes excessively CPU intensive. With 100k header lines CPU usage is already 12 seconds, and in a production environment we observed 500k header lines taking 18 minutes to parse. Since this can be triggered by external actors sending emails to a victim, this is a security issue. An external attacker can send specially crafted messages that consume target system resources and cause outage. One can implement restrictions on address headers on MTA component preceding Dovecot. No publicly available exploits are known.</Note>
    </Notes>
    <CVE>CVE-2024-23184</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot23-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-devel-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-fts-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-fts-solr-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-fts-squat-2.3.21.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-23184.html</URL>
        <Description>CVE-2024-23184</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229184</URL>
        <Description>SUSE Bug 1229184</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Very large headers can cause resource exhaustion when parsing message. The message-parser normally reads reasonably sized chunks of the message. However, when it feeds them to message-header-parser, it starts building up "full_value" buffer out of the smaller chunks. The full_value buffer has no size limit, so large headers can cause large memory usage. It doesn't matter whether it's a single long header line, or a single header split into multiple lines. This bug exists in all Dovecot versions. Incoming mails typically have some size limits set by MTA, so even largest possible header size may still fit into Dovecot's vsz_limit. So attackers probably can't DoS a victim user this way. A user could APPEND larger mails though, allowing them to DoS themselves (although maybe cause some memory issues for the backend in general). One can implement restrictions on headers on MTA component preceding Dovecot. No publicly available exploits are known.</Note>
    </Notes>
    <CVE>CVE-2024-23185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot23-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-backend-mysql-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-backend-pgsql-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-backend-sqlite-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-devel-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-fts-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-fts-lucene-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-fts-solr-2.3.21.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot23-fts-squat-2.3.21.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-23185.html</URL>
        <Description>CVE-2024-23185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229183</URL>
        <Description>SUSE Bug 1229183</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
