openSUSE Security Update : dovecot22 (openSUSE-2017-787)

high Nessus Plugin ID 101284



The remote openSUSE host is missing a security update.


This update for dovecot22 to version fixes the following issues :

This security issue was fixed :

- CVE-2017-2669: Don't double-expand %variables in keys.
If dict was used as the authentication passdb, using specially crafted %variables in the username could be used to cause DoS (bsc#1032248)

Additionally stronger SSL default ciphers are now used.

This non-security issue was fixed :

- Remove all references /etc/ssl/certs/. It should not be used anymore (bsc#932386)

The version also includes many fixes and enhancements :

- Multiple failed authentications within short time caused crashes.

- Use timing safe comparisons for everything related to passwords.

- Master process now sends SIGQUIT to all running children at shutdown, which instructs them to close all the socket listeners immediately. Restarting Dovecot should no longer fail due to some processes keeping the listeners open for a long time.

- Add passdb ( mechanisms=none ) to match separate passdb lookup.

- Add passdb ( username_filter ) to use passdb only if user matches the filter.

- Add dsync_commit_msgs_interval setting. It attempts to commit the transaction after saving this many new messages.

- Support imapc_features=search without ESEARCH extension.

- Add imapc_features=fetch-bodystructure to pass through remote server's FETCH BODY and BODYSTRUCTURE.

- Add quota=imapc backend to use GETQUOTA/GETQUOTAROOT on the remote server.

- Add allow_invalid_cert and ssl_ca_file parameters.

- If dovecot.index.cache corruption is detected, reset only the one corrupted mail instead of the whole file.

- Add 'firstsaved' field to doveadm mailbox status.

- Add old host's up/down and vhost count as parameters to director_flush_socket.

- More fixes to automatically fix corruption in dovecot.list.index.

- Fix support for dsync_features=empty-header-workaround.

- IMAP NOTIFY wasn't working for non-INBOX if IMAP client hadn't enabled modseq tracking via CONDSTORE/QRESYNC.

- Fix fts-lucene it to work again with mbox format.

- Some internal error messages may have contained garbage in v2.2.29.

- Re-encrypt when copying/moving mails and per-mailbox keys are used, otherwise the copied mails can't be opened.

This update was imported from the SUSE:SLE-12:Update update project.


Update the affected dovecot22 packages.

See Also

Plugin Details

Severity: High

ID: 101284

File Name: openSUSE-2017-787.nasl

Version: 3.6

Type: local

Agent: unix

Published: 7/7/2017

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P


Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:dovecot22, p-cpe:/a:novell:opensuse:dovecot22-backend-mysql, p-cpe:/a:novell:opensuse:dovecot22-backend-mysql-debuginfo, p-cpe:/a:novell:opensuse:dovecot22-backend-pgsql, p-cpe:/a:novell:opensuse:dovecot22-backend-pgsql-debuginfo, p-cpe:/a:novell:opensuse:dovecot22-backend-sqlite, p-cpe:/a:novell:opensuse:dovecot22-backend-sqlite-debuginfo, p-cpe:/a:novell:opensuse:dovecot22-debuginfo, p-cpe:/a:novell:opensuse:dovecot22-debugsource, p-cpe:/a:novell:opensuse:dovecot22-devel, p-cpe:/a:novell:opensuse:dovecot22-fts, p-cpe:/a:novell:opensuse:dovecot22-fts-debuginfo, p-cpe:/a:novell:opensuse:dovecot22-fts-lucene, p-cpe:/a:novell:opensuse:dovecot22-fts-lucene-debuginfo, p-cpe:/a:novell:opensuse:dovecot22-fts-solr, p-cpe:/a:novell:opensuse:dovecot22-fts-solr-debuginfo, p-cpe:/a:novell:opensuse:dovecot22-fts-squat, p-cpe:/a:novell:opensuse:dovecot22-fts-squat-debuginfo, cpe:/o:novell:opensuse:42.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 7/6/2017

Vulnerability Publication Date: 6/21/2018

Reference Information

CVE: CVE-2017-2669