openSUSE 16 Security Update : dovecot24 (openSUSE-SU-2025-20113-1)

high Nessus Plugin ID 277015

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

The remote openSUSE 16 host has packages installed that are affected by a vulnerability as referenced in the openSUSE- SU-2025-20113-1 advisory.

- Update dovecot to 2.4.2:
- CVE-2025-30189: Fixed users cached with same cache key when auth cache was enabled (bsc#1252839)
- Changes
- auth: Remove proxy_always field.
- config: Change settings history parsing to use python3.
- doveadm: Print table formatter - Print empty values as -.
- imapc: Propagate remote error codes properly.
- lda: Default mail_home=$HOME environment if not using userdb lookup
- lib-dcrypt: Salt for new version 2 keys has been increased to 16 bytes.
- lib-dregex: Add libpcre2 based regular expression support to Dovecot, if the library is missing, disable all regular expressions. This adds libpcre2-32 as build dependency.
- lib-oauth2: jwt - Allow nbf and iat to point 1 second into future.
- lib: Replace libicu with our own unicode library. Removes libicu as build dependency.
- login-common: If proxying fails due to remote having invalid SSL cert, don't reconnect.
- New features
- auth: Add ssl_client_cert_fp and ssl_client_cert_pubkey_fp fields
- config: Add support for $SET:filter/path/setting.
- config: Improve @group includes to work with overwriting their settings.
- doveadm kick: Add support for kicking multiple usernames
- doveadm mailbox status: Add support for deleted status item.
- imap, imap-client: Add experimental partial IMAP4rev2 support.
- imap: Implement support for UTF8=ACCEPT for APPEND
- lib-oauth2, oauth2: Add oauth2_token_expire_grace setting.
- lmtp: lmtp-client - Support command pipelining.
- login-common: Support local/remote blocks better.
- master: accept() unix/inet connections before creating child process to handle it. This reduces timeouts when child processes are slow to spawn themselves.
- Bug fixes
- SMTPUTF8 was accepted even when it wasn't enabled.
- auth, *-login: Direct logging with -L parameter was not working.
- auth: Crash occured when OAUTH token validation failed with oauth2_use_worker_with_mech=yes.
- auth: Invalid field handling crashes were fixed.
- auth: ldap - Potential crash could happen at deinit.
- auth: mech-gssapi - Server sending empty initial response would cause errors.
- auth: mech-winbind - GSS-SPNEGO mechanism was erroneously marked as
- not accepting NUL.
- config: Multiple issues with $SET handling has been fixed.
- configure: Building without LDAP didn't work.
- doveadm: If source user didn't exist, a crash would occur.
- imap, pop3, submission, imap-urlauth: USER environment usage was broken when running standalone.
- imap-hibernate: Statistics would get truncated on unhibernation.
- imap: SEARCH MIMEPART FILENAME ENDS command could have accessed memory outside allocated buffer, resulting in a crash.
- imapc: Fetching partial headers would cause other cached headers to be cached empty, breaking e.g. imap envelope responses when caching to disk.
- imapc: Shared namespace's INBOX mailbox was not always uppercased.
- imapc: imapc_features=guid-forced GUID generation was not working correctly.
- lda: USER environment was not accepted if -d hasn't been specified.
- lib-http: http-url - Significant path percent encoding through parse and create was not preserved. This is mainly important for Dovecot's Lua bindings for lib-http.
- lib-settings: Crash would occur when using %variables in SET_FILE type settings.
- lib-storage: Attachment flags were attempted to be added for readonly mailboxes with mail_attachment_flags=add-flags.
- lib-storage: Root directory for unusable shared namespaces was unnecessarily attempted to be created.
- lib: Crash would occur when config was reloaded and logging to syslog.
- login-common: Crash might have occured when login proxy was destroyed.
- sqlite: The sqlite_journal_mode=wal setting didn't actually do anything.
- Many other bugs have been fixed.
- Update pigeonhole to 2.4.2
- Changes
- lib-sieve: Use new regular expression library in core.
- managesieve: Add default service_extra_groups=$SET:default_internal_group.
- New features
- lib-sieve: Add support for extlists extension.
- lib-sieve: regex - Allow unicode comparator.
- Bug fixes
- lib-sieve-tool: sieve-tool - All sieve_script settings were overriden.
- lib-sieve: storage: dict: sieve_script_dict filter was missing from settings.
- sieve-ldap-storage: Fix compile without LDAP.

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1252839

https://www.suse.com/security/cve/CVE-2025-30189

Plugin Details

Severity: High

ID: 277015

File Name: openSUSE-2025-20113-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 12/2/2025

Updated: 12/2/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:N

CVSS Score Source: CVE-2025-30189

CVSS v3

Risk Factor: High

Base Score: 7.4

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:opensuse:16.0, p-cpe:/a:novell:opensuse:dovecot24-backend-pgsql, p-cpe:/a:novell:opensuse:dovecot24-devel, p-cpe:/a:novell:opensuse:dovecot24, p-cpe:/a:novell:opensuse:dovecot24-fts-flatcurve, p-cpe:/a:novell:opensuse:dovecot24-backend-sqlite, p-cpe:/a:novell:opensuse:dovecot24-fts, p-cpe:/a:novell:opensuse:dovecot24-backend-mysql, p-cpe:/a:novell:opensuse:dovecot24-fts-solr

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/27/2025

Vulnerability Publication Date: 10/31/2025

Reference Information

CVE: CVE-2025-30189