Fedora 30: opensmtpd FEDORA-2020-31216ab928

    Date 03 Mar 2020
    419
    Posted By LinuxSecurity Advisories
    Release 6.6.4p1 (2020-02-24) --- - An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group. Release 6.6.3p1 (2020-02-10) --- - Following the 6.6.2p1 release, various improvements were
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2020-31216ab928
    2020-03-03 20:53:23.501469
    --------------------------------------------------------------------------------
    
    Name        : opensmtpd
    Product     : Fedora 30
    Version     : 6.6.4p1
    Release     : 1.fc30
    URL         : https://www.opensmtpd.org/
    Summary     : Free implementation of the server-side SMTP protocol as defined by RFC 5321
    Description :
    OpenSMTPD is a FREE implementation of the server-side SMTP protocol as defined
    by RFC 5321, with some additional standard extensions. It allows ordinary
    machines to exchange e-mails with other systems speaking the SMTP protocol.
    Started out of dissatisfaction with other implementations, OpenSMTPD nowadays
    is a fairly complete SMTP implementation. OpenSMTPD is primarily developed
    by Gilles Chehade, Eric Faurot and Charles Longeau; with contributions from
    various OpenBSD hackers. OpenSMTPD is part of the OpenBSD Project.
    The software is freely usable and re-usable by everyone under an ISC license.
    
    This package uses standard "alternatives" mechanism, you may call
    "/usr/sbin/alternatives --set mta /usr/sbin/sendmail.opensmtpd"
    if you want to switch to OpenSMTPD MTA immediately after install, and
    "/usr/sbin/alternatives --set mta /usr/sbin/sendmail.sendmail" to revert
    back to Sendmail as a default mail daemon.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    Release 6.6.4p1 (2020-02-24) ---  - An out of bounds read in smtpd allows an
    attacker to inject arbitrary commands into the envelope file which are then
    executed as root. Separately, missing privilege revocation in smtpctl allows
    arbitrary commands to be run with the _smtpq group.   Release 6.6.3p1
    (2020-02-10) ---  - Following the 6.6.2p1 release, various improvements were
    done in OpenBSD -current to mitigate the risk of similar bugs.
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Mon Feb 24 2020 Denis Fateyev  - 6.6.4p1-1
    - Update to 6.6.4p1 release
    * Thu Jan 30 2020 Denis Fateyev  - 6.6.2p1-1
    - Update to 6.6.2p1 release
    - Remove obsolete patch and spec cleanup
    * Wed Jan 29 2020 Fedora Release Engineering  - 6.0.3p1-9
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
    * Thu Jul 25 2019 Fedora Release Engineering  - 6.0.3p1-8
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1801477 - opensmtpd-6.6.4p1 is available
            https://bugzilla.redhat.com/show_bug.cgi?id=1801477
    --------------------------------------------------------------------------------
    
    This update can be installed with the "dnf" update program. Use
    su -c 'dnf upgrade --advisory FEDORA-2020-31216ab928' at the command
    line. For more information, refer to the dnf documentation available at
    https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
    
    All packages are signed with the Fedora Project GPG key. More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
    To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
    Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
    List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
    List Archives: https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/25-what-do-you-think-of-the-linuxsecurity-privacy-news-articles?task=poll.vote&format=json
    25
    radio
    [{"id":"90","title":"Love them!","votes":"96","type":"x","order":"1","pct":80,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"18","type":"x","order":"2","pct":15,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"6","type":"x","order":"3","pct":5,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.