Debian Patches

Status for dovecot/1:2.4.1+dfsg1-6+deb13u4

Patch Description Author Forwarded Bugs Origin Last update
skip-rfc-subdir.patch Don't try to build doc/rfc subdir components Noah Meyerhans <noahm@debian.org> not-needed 2020-05-21
0001-lda-Fix-using-USER-environment-if-d-hasn-t-been-spec.patch lda: Fix using USER environment if -d hasn't been specified
This became broken at some point.
Timo Sirainen <timo.sirainen@open-xchange.com> no 2025-05-26
0002-lda-Default-mail_home-HOME-environment-if-not-using-.patch lda: Default mail_home=$HOME environment if not using userdb lookup

The previous code to do this was removed by
e57d5b9002f910c095ee5b55821395fcf1da016a
Timo Sirainen <timo.sirainen@open-xchange.com> no 2025-05-26
Use-_FORTIFY_SOURCE-level-3.patch Use _FORTIFY_SOURCE level 3 Christian Göttsche <cgzones@googlemail.com> not-needed 2022-12-22
fit-32-bit-test-integers.patch =================================================================== no
bug1104549-gssapi-regression.patch Fix GSSAPI regression Dovecot 2.4 introduced a regression that broke GSSAPI authentication for
some clients. This patch contains a fix provided by the upstream maintainers.
no debian https://dovecot.org/mailman3/archives/list/dovecot@dovecot.org/message/O54EAGLIXXHMOH7BQCCKHHB3Z32HDWVR/ 2025-05-02
fix-man-errors.patch Fix groff errors in upstream manpages Noah Meyerhans <noahm@debian.org> no 2025-05-02
bug1106784_Fix-LDAP-SASL-auth-support.patch Fix LDAP SASL auth support
961275fdb54878fdfa4ee1b9f1a4f00e82bf4a83 moved code without creating a
way to have HAVE_LDAP_SASL defined there.

Copy the preprocessor block from src/auth/db-ldap.c to fix this.
Jakob Haufe <sur5r@sur5r.net> no 2025-05-25
auth__Use_AUTH_CACHE_KEY_USER_instead_of_per-database.patch auth: Use AUTH_CACHE_KEY_USER instead of per-database constants

Fixes cache key issue where users would end up overwriting
each other in cache due to cache key being essentially static
string because we no longer support %u.

Forgotten in 2e298e7ee98b6df61cf85117f000290d60a473b8
Aki Tuomi <aki.tuomi@open-xchange.com> no 2025-07-25
auth__Terminate_properly_auth_oauth2_post_setting_defines.patch auth: Terminate properly auth_oauth2_post_setting_defines list

Fixes:
Timo Sirainen <timo.sirainen@open-xchange.com> no 2025-05-15
lib-sieve_sieve-script_c_sieve_script_create_common_Correctly_handle_errors.patch lib-sieve/sieve-script.c: sieve_script_create_common: Correctly handle errors.

Fixes null pointer deref (e.g. in case of absent file).
Alexander Gerasiov <a@gerasiov.net> no 2025-09-23
bug1121000_dovecot-ldap_Crash_if_iterate_filter_is_set_but_iterate_fields_is_not_set.patch auth: ldap - Fix crash if users are iterated, but userdb_ldap_iterate_fields is not set Timo Sirainen <timo.sirainen@open-xchange.com> no debian 2025-11-06
0001-trash-Use-mailbox-event-in-trash_try_mailbox-for-set.patch trash: Use mailbox event in trash_try_mailbox() for settings Aki Tuomi <aki.tuomi@open-xchange.com> no debian 2026-01-09
acl-Fix-crash-when-group-ACLs-are-used-but-user-s-ac.patch acl: Fix crash when group ACLs are used, but user's acl_groups is empty Marco Bettini <marco.bettini@open-xchange.com> no debian 2025-08-28
CVE-2025-59028.patch [PATCH 01/24] auth: Don't disconnect auth client when invalid base64 SASL input is received

The base64 input comes from untrusted client. It shouldn't cause the auth
client to disconnect, which causes other concurrent logins to be aborted.

Broken by 1486c30e191ff079bfa78e7950173bb33d8073d9
Timo Sirainen <timo.sirainen@open-xchange.com> no 2025-11-04
CVE-2025-59031.patch [PATCH 02/24] fts: Remove decode2text.sh
The script is flawed and not fit for production use, should
recommend writing your own script, or using Apache Tika.
Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-01-08
CVE-2025-59032.patch managesieve-login: Fix crash when command didn't finish on the first call Timo Sirainen <timo.sirainen@open-xchange.com> no 2025-12-22
CVE-2026-24031-27860-1.patch [PATCH 04/24] auth: Make struct settings_get_params params const Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-02-25
CVE-2026-24031-27860-2.patch [PATCH 05/24] auth: passdb/userdb ldap - Fix escaping ldap filter, base and bind_userdn

Broken by c2ccdab8d09dec65753ee42366f48d53d7f47cfd
Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-02-20
CVE-2026-24031-27860-3.patch [PATCH 06/24] lib-settings: settings_get_params() - Fix using provided escape_func

This fixes auth-sql and auth-ldap to actually do escaping.
Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-02-23
CVE-2026-24031-27860-4.patch [PATCH 07/24] auth: test-auth - Run Lua unit tests even when building Lua as plugin Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-02-23
CVE-2026-24031-27860-5.patch [PATCH 08/24] auth: Rewrite ldap_escape() with a unit test Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-02-23
CVE-2026-24031-27860-6.patch [PATCH 09/24] auth: passdb sql - Fix escaping for set_credentials()
This was only used by OTP SASL mechanism after successful authentication, so
it practically couldn't be used for SQL injections.

Broken by ef0c63b690e6ef9fbd53cb815dfab50d1667ba3a
Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-02-24
CVE-2026-24031-27860-7.patch [PATCH 10/24] auth: userdb sql - Fix escaping for user iteration
This is mostly a non-issue, since userdb iteration doesn't take any
untrusted input.

Broken by ef0c63b690e6ef9fbd53cb815dfab50d1667ba3a
Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-02-24
CVE-2026-24031-27860-8.patch [PATCH 11/24] lib-var-expand: Add "safe" filter to prevent escaping output

For example ldap_base = %{passdb:next_dn | safe} to avoid escaping the DN.
Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-02-25
CVE-2026-27855-1.patch [PATCH 21/24] auth: cache - Use translated username in auth_cache_remove() Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-03-09
CVE-2026-27855-2.patch [PATCH 22/24] auth: Move passdb event lifecycle handling to auth_request_passdb_event_(begin|end) Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-03-11
CVE-2026-27855-3.patch [PATCH 23/24] auth: Initialize set_credentials event properly
Fixes update_query
Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-03-09
CVE-2026-27855-4.patch [PATCH 24/24] auth: passdb-sql - Require update_query to be set when used Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-03-11
CVE-2026-27856-1.patch [PATCH 16/24] doveadm: client-connection - Use timing safe credential check Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-03-04
CVE-2026-27856-2.patch [PATCH 17/24] doveadm: Use datastack for temporary b64 value
There is no need to allocate it from connection pool.
Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-03-04
CVE-2026-27856-3.patch [PATCH 18/24] doveadm: client-connection - Get API key from per-connection settings Aki Tuomi <aki.tuomi@open-xchange.com> no 2026-03-04
CVE-2026-27857-1.patch [PATCH 1/2] plugins: imap-filter-sieve: imap-filter-sieve - Adjust to imap_parser_create() API change Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-03-06
CVE-2026-27857-2.patch [PATCH 12/24] lib-imap, global: Add params parameter to imap_parser_create() Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-03-06
CVE-2026-27857-3.patch [PATCH 13/24] lib-imap: Add imap_parser_params.list_count_limit Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-03-06
CVE-2026-27857-4.patch [PATCH 14/24] imap-login: Limit the number of open IMAP parser lists
This prevents attackers from using a large number of '(' in a command to
grow memory usage excessively.
Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-03-06
CVE-2026-27857-5.patch [PATCH 15/24] global: Use const for struct imap_parser_params params Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-03-02
CVE-2026-27858.patch [PATCH 2/2] managesieve-login: Verify AUTHENTICATE initial response size isn't too large

This prevents DoSing the managesieve-login by sending an excessively large
initial response size, which causes a huge memory allocation.
Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-03-02
CVE-2026-27859.patch [PATCH 03/24] lib-mail: Limit the number of RFC2231 parameters that can be parsed

This avoids excessive CPU usage especially in result_append().
Timo Sirainen <timo.sirainen@open-xchange.com> no 2026-02-24

All known versions for source package 'dovecot'

Links