Debian Patches

Status for dovecot/1:2.3.19.1+dfsg1-2.1+deb12u3

Patch Description Author Forwarded Bugs Origin Last update
split-protocols.patch split-protocols

Set default protocols value as empty and enable each
protocol in its own configuration file
Marco Nenciarini <mnencia@debian.org> invalid 2011-03-05
fix-mail_plugin_dir-default.patch fix mail_plugin_dir default

Fix mail_plugin_dir default value in conf.d/10-mail.conf
Marco Nenciarini <mnencia@debian.org> no upstream 2011-09-16
ssl-cert-location.patch SSL cert location

Move dovecots generated X.509 certificate out of /etc/ssl where
it doesn't belong.
"Jaldhar H. Vyas" <jaldhar@debian.org> no upstream 2014-11-30
tcpwrapper.patch Add TCP wrapper support

Configuration file for TCP wrapper support.
Joerg Dorchain <joerg@dorchain.net> no upstream 2012-08-26
default-mail_location.patch default location for user mailboxes

Set a default for the case where a user has no mail so auto-
detection of mailboxes doesn't work.
"Jaldhar H. Vyas" <jaldhar@debian.org> no upstream 2017-09-20
mboxlocking.patch policy 22.6 compliant mbox write locking
For NFS safety, prefer fcntl to dotlocks.
Dovecots default is the other way around.
"Jaldhar H. Vyas" <jaldhar@debian.org> no upstream 2013-08-22
dovecot_name.patch Update Dovecot name to include Distribution in login greeting message

This patch was found at: https://blueprints.launchpad.net/ubuntu/+spec/servercloud-s-server-app-banner-updates
and originally provided by Ubuntu for their 2.1.7 package. The original
author is Yolanda Robla <yolanda.robla@canonical.com>. I updated it
for Debian's 2.2.5 package.
"Jaldhar H. Vyas" <jaldhar@debian.org> no 2020-05-23
ssl-dh-params-location.patch Set DH params location

This is mandatory for SSL support in 2.3
Apollon Oikonomopoulos <apoikos@debian.org> not-needed 2018-03-24
skip-rfc-subdir.patch Don't try to build doc/rfc subdir components Noah Meyerhans <noahm@debian.org> invalid 2020-05-21
Correct-misspellings.patch Correct misspellings
Found by Lintian
Christian Göttsche <cgzones@googlemail.com> no 2020-05-31
test-backtrace.patch Updates the symbol to check for in the backtrace unit tests
Updates the symbol to check for in the backtrace unit tests to
something that appears in all the traces on the platforms we support.
Noah Meyerhans <noahm@debian.org> no 2020-06-12
doveadm-director.1-drop-acute-accent.patch doveadm-director.1: drop acute accent
Found by Lintian:

This manual page uses the \' groff sequence. Usually, the intent to
generate an apostrophe, but that sequence actually renders as a an acute
accent.

For an apostrophe or a single closing quote, use plain '. For single
opening quote, i.e. a straight downward line ' like the one used in
shell commands, use &#92;(aq.
Christian Göttsche <cgzones@googlemail.com> no 2020-08-14
Fix-32bit-sign-comparisons.patch Fix 32bit sign comparisons
sieve-binary.c: In function 'sieve_binary_get_resource_usage':
sieve-binary.c:199:54: warning: comparison of integer expressions of different signedness: 'time_t' {aka 'long int'} and 'unsigned int' [-Wsign-compare]
199 | if (update_time != 0 && (ioloop_time - update_time) > timeout)
| ^
Christian Göttsche <cgzones@googlemail.com> no 2021-01-04
Improve-cross-compile-support.patch Improve cross-compile support
The check for the signedness of size_t really doesn't have to be run as
that is a compile time property.

Beyond that, dovecot uses mysql_config. I've looked into that and
mysql_config is unfixably broken during cross builds. It will not be
fixed. Instead, please use pkg-config. My patch implements that with a
fallback to mysql_config to avoid breaking other users.

Last but not least, src/lib-lua/Makefile.am adds $(LUA_LIBS) to
libdovecot_lua_la_DEPENDENCIES. As it happens, LUA_LIBS contains a -L
flag and when that flag shows up in a dependency, make gives up. I have
no clue why one would add LUA_LIBS to DEPENDENCIES as it already is
being correctly added to LIBADD. My patch suggests to quite simply drop
that.
Helmut Grohne <helmut@subdivi.de> no 2021-01-05
Silence-LTO-related-compiler-warning.patch Silence LTO related compiler warning
master-service-settings-cache.c: In function 'master_service_settings_cache_init_filter':
master-service-settings-cache.c:94:3: warning: 'error' may be used uninitialized in this function [-Wmaybe-uninitialized]
94 | i_error("master-service: cannot get filters: %s", error);
| ^
master-service-settings-cache.c:89:14: note: 'error' was declared here
89 | const char *error;
| ^
Christian Göttsche <cgzones@googlemail.com> no 2021-06-21
md4-md5-disable-optimization-causing-unaligned-access.patch md4/md5: disable optimization causing unaligned access
This restores unit tests with GCC 11 and LTO.

md5.c:92:23: warning: cast from 'const unsigned char *' to 'const uint32_t *' (aka 'const unsigned int *') increases required alignment from 1 to 4 [-Wcast-align]
STEP(F, a, b, c, d, SET(0), 0xd76aa478, 7)
~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~
md5.c:51:4: note: expanded from macro 'SET'
(*(const uint32_t *)&ptr[(n) * 4])
^
md5.c:37:29: note: expanded from macro 'STEP'
(a) += f((b), (c), (d)) + (x) + (t); \
^

md5.c:92:3: runtime error: load of misaligned address 0x61900000008b for type 'const uint32_t' (aka 'const unsigned int'), which requires 4 byte alignment
0x61900000008b: note: pointer points here
41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
^
Christian Göttsche <cgzones@googlemail.com> no 2021-12-07
Support-openssl-3.0.patch Support openssl 3.0 Michal Hlavinka no https://bugzilla.redhat.com/show_bug.cgi?id=1962035 2022-05-11
Debug-flaky-unit-test.patch Debug flaky unit test
See #1007744
Christian Göttsche <cgzones@googlemail.com> no 2022-06-06
Avoid-usage-of-PATH_MAX-not-available-on-hurd.patch Avoid usage of PATH_MAX not available on hurd Christian Göttsche <cgzones@googlemail.com> no 2022-06-06
auth-Fix-handling-passdbs-with-identical-driver-args-but-.patch auth: Fix handling passdbs with identical driver/args but different mechanisms/username_filter

The passdb was wrongly deduplicated in this situation, causing wrong
mechanisms or username_filter setting to be used. This would be a rather
unlikely configuration though.

Fixed by moving mechanisms and username_filter from struct passdb_module
to struct auth_passdb, which is where they should have been in the first
place.
Timo Sirainen <timo.sirainen@open-xchange.com> no 2022-05-09
auth-Add-a-comment-about-updating-userdb_find.patch auth: Add a comment about updating userdb_find() Timo Sirainen <timo.sirainen@open-xchange.com> no 2022-05-16
Fix-uninitialized-read-in-doveadm-oldstats.patch Fix uninitialized read in doveadm-oldstats
The third argument to doveadm_cmd_param_bool() is only set on a return
value of TRUE.
Since disk_input_field and disk_output_field should be set if the value
of show-disk-io is specified and specified to true, fix the condition.

doveadm-oldstats.c: In function 'cmd_stats_top':
doveadm-oldstats.c:551:63: warning: 'b' may be used uninitialized [-Wmaybe-uninitialized]
551 | if (!doveadm_cmd_param_bool(cctx, "show-disk-io", &b) && b) {
| ^
doveadm-oldstats.c:545:14: note: 'b' was declared here
545 | bool b;
| ^
Christian Göttsche <cgzones@googlemail.com> no 2022-07-23
CVE-2024-23184.patch Upstream fix for CVE-2024-23184 Timo Sirainen <timo.sirainen@open-xchange.com> no https://github.com/dovecot/core/compare/8e4c42d%5E...1481c04.patch
CVE-2024-23185.patch Upstream fix for CVE-2024-23185 Marco Bettini <marco.bettini@open-xchange.com> no 2024-04-12
CVE-2025-59031.patch [PATCH 02/24] fts: Remove decode2text.sh
The script is flawed and not fit for production use, should
recommend writing your own script, or using Apache Tika.
Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-01-08
CVE-2025-59032.patch managesieve-login: Fix crash when command didn't finish on the first call Timo Sirainen <timo.sirainen@open-xchange.com> no 2025-12-22
CVE-2026-0394-1.patch auth: db-passwd-file - Add db_passwd_fix_path() Aki Tuomi <aki.tuomi@open-xchange.com> no 2024-11-13
CVE-2026-0394-2.patch auth: db-passwd-file - Normalize path with db_passwd_fix_path()

Otherwise there is a chance that we leak one ../
Aki Tuomi <aki.tuomi@open-xchange.com> no 2024-11-13
CVE-2026-27855-1.patch [PATCH 21/24] auth: cache - Use translated username in auth_cache_remove() Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-03-09
CVE-2026-27855-2.patch [PATCH 22/24] auth: Move passdb event lifecycle handling to auth_request_passdb_event_(begin|end) Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-03-11
CVE-2026-27855-3.patch [PATCH 23/24] auth: Initialize set_credentials event properly
Fixes update_query
Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-03-09
CVE-2026-27855-4.patch [PATCH 24/24] auth: passdb-sql - Require update_query to be set when used Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-03-11
CVE-2026-27856-1.patch [PATCH 16/24] doveadm: client-connection - Use timing safe credential check Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-03-04
CVE-2026-27856-2.patch [PATCH 17/24] doveadm: Use datastack for temporary b64 value
There is no need to allocate it from connection pool.
Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-03-04
CVE-2026-27856-3.patch [PATCH 18/24] doveadm: client-connection - Get API key from per-connection settings Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-03-04
CVE-2026-27857-1.patch [PATCH 1/2] plugins: imap-filter-sieve: imap-filter-sieve - Adjust to imap_parser_create() API change Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-03-06
CVE-2026-27857-2.patch [PATCH 12/24] lib-imap, global: Add params parameter to imap_parser_create() Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-03-06
CVE-2026-27857-3.patch [PATCH 13/24] lib-imap: Add imap_parser_params.list_count_limit Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-03-06
CVE-2026-27857-4.patch [PATCH 14/24] imap-login: Limit the number of open IMAP parser lists
This prevents attackers from using a large number of '(' in a command to
grow memory usage excessively.
Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-03-06
CVE-2026-27857-5.patch [PATCH 15/24] global: Use const for struct imap_parser_params params Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-03-02
CVE-2026-27858.patch [PATCH 2/2] managesieve-login: Verify AUTHENTICATE initial response size isn't too large

This prevents DoSing the managesieve-login by sending an excessively large
initial response size, which causes a huge memory allocation.
Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-03-02
CVE-2026-27859.patch [PATCH 03/24] lib-mail: Limit the number of RFC2231 parameters that can be parsed

This avoids excessive CPU usage especially in result_append().
Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-02-24

All known versions for source package 'dovecot'

Links