CVE-2026-27859

NameCVE-2026-27859
DescriptionA mail message containing excessive amount of RFC 2231 MIME parameters causes LMTP to use too much CPU. A suitably formatted mail message causes mail delivery process to consume large amounts of CPU time. Use MTA capabilities to limit RFC 2231 MIME parameters in mail messages, or upgrade to fixed version where the processing is limited. No publicly available exploits are known.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6197-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dovecot (PTS)bullseye1:2.3.13+dfsg1-2+deb11u1vulnerable
bullseye (security)1:2.3.13+dfsg1-2+deb11u2vulnerable
bookworm1:2.3.19.1+dfsg1-2.1+deb12u1vulnerable
bookworm (security)1:2.3.19.1+dfsg1-2.1+deb12u3fixed
trixie1:2.4.1+dfsg1-6+deb13u3vulnerable
trixie (security)1:2.4.1+dfsg1-6+deb13u4fixed
forky1:2.4.2+dfsg1-4vulnerable
sid1:2.4.3+dfsg1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dovecotsourcebookworm1:2.3.19.1+dfsg1-2.1+deb12u2DSA-6197-1
dovecotsourcetrixie1:2.4.1+dfsg1-6+deb13u4DSA-6197-1
dovecotsource(unstable)1:2.4.3+dfsg1-1

Notes

https://dovecot.org/mailman3/archives/list/dovecot-news@dovecot.org/thread/IKIHZX77IPTGSP5WBIPJUOFBUQFKVPE7/
https://documentation.open-xchange.com/dovecot/security/advisories/html/2026/oxdc-adv-2026-0001.html#cve-2026-27859-v3-0-2-regression-message-headers-mime-parameter-parsing-can-cause-excessive-cpu-usage
Fixed by: https://github.com/dovecot/core/commit/6dcf39ca18993f3e84b93b5ea13048bded00f981 (2.4.3)

Search for package or bug name: Reporting problems