<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for dovecot24</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:21159-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-11-27T20:19:42Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-11-27T20:19:42Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-11-27T20:19:42Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for dovecot24</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for dovecot24 fixes the following issues:

- Update dovecot to 2.4.2:
  - CVE-2025-30189: Fixed users cached with same cache key when
    auth cache was enabled (bsc#1252839)
  - Changes
    - auth: Remove proxy_always field.
    - config: Change settings history parsing to use python3.
    - doveadm: Print table formatter - Print empty values as "-".
    - imapc: Propagate remote error codes properly.
    - lda: Default mail_home=$HOME environment if not using userdb
      lookup
    - lib-dcrypt: Salt for new version 2 keys has been increased to
      16 bytes.
    - lib-dregex: Add libpcre2 based regular expression support to
      Dovecot, if the library is missing, disable all regular
      expressions. This adds libpcre2-32 as build dependency.
    - lib-oauth2: jwt - Allow nbf and iat to point 1 second into
      future.
    - lib: Replace libicu with our own unicode library. Removes
      libicu as build dependency.
    - login-common: If proxying fails due to remote having invalid
      SSL cert, don't reconnect.
  - New features
    - auth: Add ssl_client_cert_fp and ssl_client_cert_pubkey_fp
      fields
    - config: Add support for $SET:filter/path/setting.
    - config: Improve @group includes to work with overwriting
      their settings.
    - doveadm kick: Add support for kicking multiple usernames
    - doveadm mailbox status: Add support for deleted status item.
    - imap, imap-client: Add experimental partial IMAP4rev2
      support.
    - imap: Implement support for UTF8=ACCEPT for APPEND
    - lib-oauth2, oauth2: Add oauth2_token_expire_grace setting.
    - lmtp: lmtp-client - Support command pipelining.
    - login-common: Support local/remote blocks better.
    - master: accept() unix/inet connections before creating child
      process to handle it. This reduces timeouts when child
      processes are slow to spawn themselves.
  - Bug fixes
    - SMTPUTF8 was accepted even when it wasn't enabled.
    - auth, *-login: Direct logging with -L parameter was not
      working.
    - auth: Crash occured when OAUTH token validation failed with
      oauth2_use_worker_with_mech=yes.
    - auth: Invalid field handling crashes were fixed.
    - auth: ldap - Potential crash could happen at deinit.
    - auth: mech-gssapi - Server sending empty initial response
      would cause errors.
    - auth: mech-winbind - GSS-SPNEGO mechanism was erroneously
      marked as
    - not accepting NUL.
    - config: Multiple issues with $SET handling has been fixed.
    - configure: Building without LDAP didn't work.
    - doveadm: If source user didn't exist, a crash would occur.
    - imap, pop3, submission, imap-urlauth: USER environment usage
      was broken when running standalone.
    - imap-hibernate: Statistics would get truncated on
      unhibernation.
    - imap: "SEARCH MIMEPART FILENAME ENDS" command could have
      accessed memory outside allocated buffer, resulting in a
      crash.
    - imapc: Fetching partial headers would cause other cached
      headers to be cached empty, breaking e.g. imap envelope
      responses when caching to disk.
    - imapc: Shared namespace's INBOX mailbox was not always
      uppercased.
    - imapc: imapc_features=guid-forced GUID generation was not
      working correctly.
    - lda: USER environment was not accepted if -d hasn't been
      specified.
    - lib-http: http-url - Significant path percent encoding
      through parse and create was not preserved. This is mainly
      important for Dovecot's Lua bindings for lib-http.
    - lib-settings: Crash would occur when using %variables in
      SET_FILE type settings.
    - lib-storage: Attachment flags were attempted to be added for
      readonly mailboxes with mail_attachment_flags=add-flags.
    - lib-storage: Root directory for unusable shared namespaces
      was unnecessarily attempted to be created.
    - lib: Crash would occur when config was reloaded and logging
      to syslog.
    - login-common: Crash might have occured when login proxy was
      destroyed.
    - sqlite: The sqlite_journal_mode=wal setting didn't actually
      do anything.
    - Many other bugs have been fixed.
- Update pigeonhole to 2.4.2
  - Changes
    - lib-sieve: Use new regular expression library in core.
    - managesieve: Add default
      service_extra_groups=$SET:default_internal_group.
  - New features
    - lib-sieve: Add support for "extlists" extension.
    - lib-sieve: regex - Allow unicode comparator.
  - Bug fixes
    - lib-sieve-tool: sieve-tool - All sieve_script settings were
      overriden.
    - lib-sieve: storage: dict: sieve_script_dict filter was
      missing from settings.
    - sieve-ldap-storage: Fix compile without LDAP.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLES-16.0-79</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521159-1/</URL>
      <Description>Link for SUSE-SU-2025:21159-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-December/023506.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:21159-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1252839</URL>
      <Description>SUSE Bug 1252839</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-30189/</URL>
      <Description>SUSE CVE CVE-2025-30189 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 16.0">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 16.0">
        <FullProductName ProductID="SUSE Linux Enterprise Server 16.0" CPE="cpe:/o:suse:sles:16.0">SUSE Linux Enterprise Server 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 16.0">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 16.0">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 16.0">SUSE Linux Enterprise Server for SAP Applications 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-2.4.2-160000.1.1">
      <FullProductName ProductID="dovecot24-2.4.2-160000.1.1">dovecot24-2.4.2-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-backend-mysql-2.4.2-160000.1.1">
      <FullProductName ProductID="dovecot24-backend-mysql-2.4.2-160000.1.1">dovecot24-backend-mysql-2.4.2-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-backend-pgsql-2.4.2-160000.1.1">
      <FullProductName ProductID="dovecot24-backend-pgsql-2.4.2-160000.1.1">dovecot24-backend-pgsql-2.4.2-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-backend-sqlite-2.4.2-160000.1.1">
      <FullProductName ProductID="dovecot24-backend-sqlite-2.4.2-160000.1.1">dovecot24-backend-sqlite-2.4.2-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-devel-2.4.2-160000.1.1">
      <FullProductName ProductID="dovecot24-devel-2.4.2-160000.1.1">dovecot24-devel-2.4.2-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-fts-2.4.2-160000.1.1">
      <FullProductName ProductID="dovecot24-fts-2.4.2-160000.1.1">dovecot24-fts-2.4.2-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dovecot24-fts-solr-2.4.2-160000.1.1">
      <FullProductName ProductID="dovecot24-fts-solr-2.4.2-160000.1.1">dovecot24-fts-solr-2.4.2-160000.1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="dovecot24-2.4.2-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1">dovecot24-2.4.2-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-backend-mysql-2.4.2-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1">dovecot24-backend-mysql-2.4.2-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-backend-pgsql-2.4.2-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1">dovecot24-backend-pgsql-2.4.2-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-backend-sqlite-2.4.2-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1">dovecot24-backend-sqlite-2.4.2-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-devel-2.4.2-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1">dovecot24-devel-2.4.2-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-fts-2.4.2-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1">dovecot24-fts-2.4.2-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-fts-solr-2.4.2-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1">dovecot24-fts-solr-2.4.2-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-2.4.2-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1">dovecot24-2.4.2-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP Applications 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-backend-mysql-2.4.2-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1">dovecot24-backend-mysql-2.4.2-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP Applications 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-backend-pgsql-2.4.2-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1">dovecot24-backend-pgsql-2.4.2-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP Applications 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-backend-sqlite-2.4.2-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1">dovecot24-backend-sqlite-2.4.2-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP Applications 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-devel-2.4.2-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1">dovecot24-devel-2.4.2-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP Applications 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-fts-2.4.2-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1">dovecot24-fts-2.4.2-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP Applications 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="dovecot24-fts-solr-2.4.2-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1">dovecot24-fts-solr-2.4.2-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP Applications 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers. No publicly available exploits are known.</Note>
    </Notes>
    <CVE>CVE-2025-30189</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:dovecot24-2.4.2-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:dovecot24-devel-2.4.2-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:dovecot24-fts-2.4.2-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:dovecot24-fts-solr-2.4.2-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-2.4.2-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-mysql-2.4.2-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-pgsql-2.4.2-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-backend-sqlite-2.4.2-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-devel-2.4.2-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-2.4.2-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:dovecot24-fts-solr-2.4.2-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521159-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-30189.html</URL>
        <Description>CVE-2025-30189</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1252839</URL>
        <Description>SUSE Bug 1252839</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
