Arch Linux Security Advisory ASA-202101-18

Severity: High
Date    : 2021-01-12
CVE-ID  : CVE-2020-35679 CVE-2020-35680
Package : opensmtpd
Type    : multiple issues
Remote  : Yes
Link    :


The package opensmtpd before version 6.8.0p2-1 is vulnerable to
multiple issues including information disclosure and denial of service.


Upgrade to 6.8.0p2-1.

# pacman -Syu "opensmtpd>=6.8.0p2-1"

The problems have been fixed upstream in version 6.8.0p2.




- CVE-2020-35679 (information disclosure)

smtpd/table.c in OpenSMTPD before 6.8.0p1 lacks a certain regfree,
which might allow attackers to trigger a "very significant" memory leak
via messages to an instance that performs many regex lookups.

- CVE-2020-35680 (denial of service)

smtpd/lka_filter.c in OpenSMTPD before 6.8.0p1, in certain
configurations, allows remote attackers to cause a denial of service
(NULL pointer dereference and daemon crash) via a crafted pattern of
client activity, because the filter state machine does not properly
maintain the I/O channel between the SMTP engine and the filters layer.


A malicious remote user might read memory or crash the service.