{"id":"USN-7013-1","summary":"dovecot vulnerabilities","details":"It was discovered that Dovecot incorrectly handled a large number of\naddress headers. A remote attacker could possibly use this issue to cause\nDovecot to consume resources, leading to a denial of service.\n(CVE-2024-23184)\n\nIt was discovered that Dovecot incorrectly handled very large headers. A\nremote attacker could possibly use this issue to cause Dovecot to consume\nresources, leading to a denial of service. (CVE-2024-23185)\n","modified":"2026-02-10T04:45:26Z","published":"2024-09-16T11:52:43Z","related":["UBUNTU-CVE-2024-23184","UBUNTU-CVE-2024-23185"],"upstream":["CVE-2024-23184","CVE-2024-23185","UBUNTU-CVE-2024-23184","UBUNTU-CVE-2024-23185"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7013-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-23184"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-23185"}],"affected":[{"package":{"name":"dovecot","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/dovecot@1:2.3.7.2-1ubuntu3.7?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.3.7.2-1ubuntu3.7"}]}],"versions":["1:2.3.4.1-5ubuntu3","1:2.3.7.2-1ubuntu1","1:2.3.7.2-1ubuntu2","1:2.3.7.2-1ubuntu3","1:2.3.7.2-1ubuntu3.1","1:2.3.7.2-1ubuntu3.2","1:2.3.7.2-1ubuntu3.3","1:2.3.7.2-1ubuntu3.4","1:2.3.7.2-1ubuntu3.5","1:2.3.7.2-1ubuntu3.6"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-auth-lua"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-core"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-dev"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-gssapi"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-imapd"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-ldap"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-lmtpd"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-lucene"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-managesieved"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-mysql"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-pgsql"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-pop3d"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-sieve"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-solr"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-sqlite"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"dovecot-submissiond"},{"binary_version":"1:2.3.7.2-1ubuntu3.7","binary_name":"mail-stack-delivery"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-23185"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7013-1.json"}},{"package":{"name":"dovecot","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/dovecot@1:2.3.16+dfsg1-3ubuntu2.4?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.3.16+dfsg1-3ubuntu2.4"}]}],"versions":["1:2.3.13+dfsg1-1ubuntu3","1:2.3.16+dfsg1-3ubuntu1","1:2.3.16+dfsg1-3ubuntu2","1:2.3.16+dfsg1-3ubuntu2.1","1:2.3.16+dfsg1-3ubuntu2.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-auth-lua"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-core"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-dev"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-gssapi"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-imapd"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-ldap"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-lmtpd"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-lucene"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-managesieved"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-mysql"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-pgsql"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-pop3d"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-sieve"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-solr"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-sqlite"},{"binary_version":"1:2.3.16+dfsg1-3ubuntu2.4","binary_name":"dovecot-submissiond"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-23184"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-23185"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7013-1.json"}}],"schema_version":"1.7.3"}