<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">dovecot24-2.4.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:15777</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-01-30T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-01-30T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-01-30T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">dovecot24-2.4.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the dovecot24-2.4.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-15777</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14461/</URL>
      <Description>SUSE CVE CVE-2017-14461 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15130/</URL>
      <Description>SUSE CVE CVE-2017-15130 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15132/</URL>
      <Description>SUSE CVE CVE-2017-15132 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-10691/</URL>
      <Description>SUSE CVE CVE-2019-10691 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11494/</URL>
      <Description>SUSE CVE CVE-2019-11494 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11499/</URL>
      <Description>SUSE CVE CVE-2019-11499 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11500/</URL>
      <Description>SUSE CVE CVE-2019-11500 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19722/</URL>
      <Description>SUSE CVE CVE-2019-19722 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3814/</URL>
      <Description>SUSE CVE CVE-2019-3814 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-7524/</URL>
      <Description>SUSE CVE CVE-2019-7524 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10957/</URL>
      <Description>SUSE CVE CVE-2020-10957 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10958/</URL>
      <Description>SUSE CVE CVE-2020-10958 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10967/</URL>
      <Description>SUSE CVE CVE-2020-10967 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12100/</URL>
      <Description>SUSE CVE CVE-2020-12100 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12673/</URL>
      <Description>SUSE CVE CVE-2020-12673 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-12674/</URL>
      <Description>SUSE CVE CVE-2020-12674 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-24386/</URL>
      <Description>SUSE CVE CVE-2020-24386 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-28200/</URL>
      <Description>SUSE CVE CVE-2020-28200 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-7046/</URL>
      <Description>SUSE CVE CVE-2020-7046 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-7957/</URL>
      <Description>SUSE CVE CVE-2020-7957 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29157/</URL>
      <Description>SUSE CVE CVE-2021-29157 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-33515/</URL>
      <Description>SUSE CVE CVE-2021-33515 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-23184/</URL>
      <Description>SUSE CVE CVE-2024-23184 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-23185/</URL>
      <Description>SUSE CVE CVE-2024-23185 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-2.4.0-1.1">
      <FullProductName ProductID="dovecot24-2.4.0-1.1">dovecot24-2.4.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-backend-mysql-2.4.0-1.1">
      <FullProductName ProductID="dovecot24-backend-mysql-2.4.0-1.1">dovecot24-backend-mysql-2.4.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-backend-pgsql-2.4.0-1.1">
      <FullProductName ProductID="dovecot24-backend-pgsql-2.4.0-1.1">dovecot24-backend-pgsql-2.4.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-backend-sqlite-2.4.0-1.1">
      <FullProductName ProductID="dovecot24-backend-sqlite-2.4.0-1.1">dovecot24-backend-sqlite-2.4.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-devel-2.4.0-1.1">
      <FullProductName ProductID="dovecot24-devel-2.4.0-1.1">dovecot24-devel-2.4.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-fts-2.4.0-1.1">
      <FullProductName ProductID="dovecot24-fts-2.4.0-1.1">dovecot24-fts-2.4.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-fts-flatcurve-2.4.0-1.1">
      <FullProductName ProductID="dovecot24-fts-flatcurve-2.4.0-1.1">dovecot24-fts-flatcurve-2.4.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-fts-solr-2.4.0-1.1">
      <FullProductName ProductID="dovecot24-fts-solr-2.4.0-1.1">dovecot24-fts-solr-2.4.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="dovecot24-2.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot24-2.4.0-1.1">dovecot24-2.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-backend-mysql-2.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1">dovecot24-backend-mysql-2.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-backend-pgsql-2.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1">dovecot24-backend-pgsql-2.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-backend-sqlite-2.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1">dovecot24-backend-sqlite-2.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-devel-2.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1">dovecot24-devel-2.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-fts-2.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1">dovecot24-fts-2.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-fts-flatcurve-2.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1">dovecot24-fts-flatcurve-2.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-fts-solr-2.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1">dovecot24-fts-solr-2.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A specially crafted email delivered over SMTP and passed on to Dovecot by MTA can trigger an out of bounds read resulting in potential sensitive information disclosure and denial of service. In order to trigger this vulnerability, an attacker needs to send a specially crafted email message to the server.</Note>
    </Notes>
    <CVE>CVE-2017-14461</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14461.html</URL>
        <Description>CVE-2017-14461</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082826</URL>
        <Description>SUSE Bug 1082826</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart.</Note>
    </Notes>
    <CVE>CVE-2017-15130</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15130.html</URL>
        <Description>CVE-2017-15130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082828</URL>
        <Description>SUSE Bug 1082828</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot's auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion.</Note>
    </Notes>
    <CVE>CVE-2017-15132</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15132.html</URL>
        <Description>CVE-2017-15132</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1075608</URL>
        <Description>SUSE Bug 1075608</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The JSON encoder in Dovecot before 2.3.5.2 allows attackers to repeatedly crash the authentication service by attempting to authenticate with an invalid UTF-8 sequence as the username.</Note>
    </Notes>
    <CVE>CVE-2019-10691</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-10691.html</URL>
        <Description>CVE-2019-10691</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132501</URL>
        <Description>SUSE Bug 1132501</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login service crashes when the client disconnects prematurely during the AUTH command.</Note>
    </Notes>
    <CVE>CVE-2019-11494</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11494.html</URL>
        <Description>CVE-2019-11494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133624</URL>
        <Description>SUSE Bug 1133624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133625</URL>
        <Description>SUSE Bug 1133625</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login component crashes if AUTH PLAIN is attempted over a TLS secured channel with an unacceptable authentication message.</Note>
    </Notes>
    <CVE>CVE-2019-11499</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11499.html</URL>
        <Description>CVE-2019-11499</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133624</URL>
        <Description>SUSE Bug 1133624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133625</URL>
        <Description>SUSE Bug 1133625</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution.</Note>
    </Notes>
    <CVE>CVE-2019-11500</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11500.html</URL>
        <Description>CVE-2019-11500</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1145559</URL>
        <Description>SUSE Bug 1145559</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Dovecot before 2.3.9.2, an attacker can crash a push-notification driver with a crafted email when push notifications are used, because of a NULL Pointer Dereference. The email must use a group address as either the sender or the recipient.</Note>
    </Notes>
    <CVE>CVE-2019-19722</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19722.html</URL>
        <Description>CVE-2019-19722</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1159090</URL>
        <Description>SUSE Bug 1159090</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.</Note>
    </Notes>
    <CVE>CVE-2019-3814</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3814.html</URL>
        <Description>CVE-2019-3814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123022</URL>
        <Description>SUSE Bug 1123022</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Dovecot before 2.2.36.3 and 2.3.x before 2.3.5.1, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components.</Note>
    </Notes>
    <CVE>CVE-2019-7524</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-7524.html</URL>
        <Description>CVE-2019-7524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130116</URL>
        <Description>SUSE Bug 1130116</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Dovecot before 2.3.10.1, unauthenticated sending of malformed parameters to a NOOP command causes a NULL Pointer Dereference and crash in submission-login, submission, or lmtp.</Note>
    </Notes>
    <CVE>CVE-2020-10957</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10957.html</URL>
        <Description>CVE-2020-10957</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171457</URL>
        <Description>SUSE Bug 1171457</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Dovecot before 2.3.10.1, a crafted SMTP/LMTP message triggers an unauthenticated use-after-free bug in submission-login, submission, or lmtp, and can lead to a crash under circumstances involving many newlines after a command.</Note>
    </Notes>
    <CVE>CVE-2020-10958</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10958.html</URL>
        <Description>CVE-2020-10958</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171458</URL>
        <Description>SUSE Bug 1171458</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Dovecot before 2.3.10.1, remote unauthenticated attackers can crash the lmtp or submission process by sending mail with an empty localpart.</Note>
    </Notes>
    <CVE>CVE-2020-10967</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10967.html</URL>
        <Description>CVE-2020-10967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171456</URL>
        <Description>SUSE Bug 1171456</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Dovecot before 2.3.11.3, uncontrolled recursion in submission, lmtp, and lda allows remote attackers to cause a denial of service (resource consumption) via a crafted e-mail message with deeply nested MIME parts.</Note>
    </Notes>
    <CVE>CVE-2020-12100</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12100.html</URL>
        <Description>CVE-2020-12100</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174920</URL>
        <Description>SUSE Bug 1174920</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180406</URL>
        <Description>SUSE Bug 1180406</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Dovecot before 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2020-12673</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12673.html</URL>
        <Description>CVE-2020-12673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174920</URL>
        <Description>SUSE Bug 1174920</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174922</URL>
        <Description>SUSE Bug 1174922</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.</Note>
    </Notes>
    <CVE>CVE-2020-12674</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-12674.html</URL>
        <Description>CVE-2020-12674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174920</URL>
        <Description>SUSE Bug 1174920</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174923</URL>
        <Description>SUSE Bug 1174923</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Dovecot before 2.3.13. By using IMAP IDLE, an authenticated attacker can trigger unhibernation via attacker-controlled parameters, leading to access to other users' email messages (and path disclosure).</Note>
    </Notes>
    <CVE>CVE-2020-24386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-24386.html</URL>
        <Description>CVE-2020-24386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180405</URL>
        <Description>SUSE Bug 1180405</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Sieve engine in Dovecot before 2.3.15 allows Uncontrolled Resource Consumption, as demonstrated by a situation with a complex regular expression for the regex extension.</Note>
    </Notes>
    <CVE>CVE-2020-28200</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-28200.html</URL>
        <Description>CVE-2020-28200</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187420</URL>
        <Description>SUSE Bug 1187420</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lib-smtp in submission-login and lmtp in Dovecot 2.3.9 before 2.3.9.3 mishandles truncated UTF-8 data in command parameters, as demonstrated by the unauthenticated triggering of a submission-login infinite loop.</Note>
    </Notes>
    <CVE>CVE-2020-7046</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-7046.html</URL>
        <Description>CVE-2020-7046</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162773</URL>
        <Description>SUSE Bug 1162773</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IMAP and LMTP components in Dovecot 2.3.9 before 2.3.9.3 mishandle snippet generation when many characters must be read to compute the snippet and a trailing &gt; character exists. This causes a denial of service in which the recipient cannot read all of their messages.</Note>
    </Notes>
    <CVE>CVE-2020-7957</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-7957.html</URL>
        <Description>CVE-2020-7957</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162773</URL>
        <Description>SUSE Bug 1162773</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access to the local filesystem can trick OAuth2 authentication into using an HS256 validation key from an attacker-controlled location. This occurs during use of local JWT validation with the posix fs driver.</Note>
    </Notes>
    <CVE>CVE-2021-29157</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29157.html</URL>
        <Description>CVE-2021-29157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187418</URL>
        <Description>SUSE Bug 1187418</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The submission service in Dovecot before 2.3.15 allows STARTTLS command injection in lib-smtp. Sensitive information can be redirected to an attacker-controlled address.</Note>
    </Notes>
    <CVE>CVE-2021-33515</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-33515.html</URL>
        <Description>CVE-2021-33515</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187419</URL>
        <Description>SUSE Bug 1187419</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Having a large number of address headers (From, To, Cc, Bcc, etc.) becomes excessively CPU intensive. With 100k header lines CPU usage is already 12 seconds, and in a production environment we observed 500k header lines taking 18 minutes to parse. Since this can be triggered by external actors sending emails to a victim, this is a security issue. An external attacker can send specially crafted messages that consume target system resources and cause outage. One can implement restrictions on address headers on MTA component preceding Dovecot. No publicly available exploits are known.</Note>
    </Notes>
    <CVE>CVE-2024-23184</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-23184.html</URL>
        <Description>CVE-2024-23184</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229184</URL>
        <Description>SUSE Bug 1229184</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Very large headers can cause resource exhaustion when parsing message. The message-parser normally reads reasonably sized chunks of the message. However, when it feeds them to message-header-parser, it starts building up "full_value" buffer out of the smaller chunks. The full_value buffer has no size limit, so large headers can cause large memory usage. It doesn't matter whether it's a single long header line, or a single header split into multiple lines. This bug exists in all Dovecot versions. Incoming mails typically have some size limits set by MTA, so even largest possible header size may still fit into Dovecot's vsz_limit. So attackers probably can't DoS a victim user this way. A user could APPEND larger mails though, allowing them to DoS themselves (although maybe cause some memory issues for the backend in general). One can implement restrictions on headers on MTA component preceding Dovecot. No publicly available exploits are known.</Note>
    </Notes>
    <CVE>CVE-2024-23185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:dovecot24-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-mysql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-pgsql-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-backend-sqlite-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-devel-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-flatcurve-2.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:dovecot24-fts-solr-2.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-23185.html</URL>
        <Description>CVE-2024-23185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229183</URL>
        <Description>SUSE Bug 1229183</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
