-------------------------------------------------------------------------------- Fedora EPEL Update Notification FEDORA-EPEL-2020-ede50a3d8b 2020-04-30 00:47:55.126597 --------------------------------------------------------------------------------
Name : opensmtpd Product : Fedora EPEL 7 Version : 6.6.4p1 Release : 3.el7 URL : http://www.opensmtpd.org/ Summary : Free implementation of the server-side SMTP protocol as defined by RFC 5321 Description : OpenSMTPD is a FREE implementation of the server-side SMTP protocol as defined by RFC 5321, with some additional standard extensions. It allows ordinary machines to exchange e-mails with other systems speaking the SMTP protocol. Started out of dissatisfaction with other implementations, OpenSMTPD nowadays is a fairly complete SMTP implementation. OpenSMTPD is primarily developed by Gilles Chehade, Eric Faurot and Charles Longeau; with contributions from various OpenBSD hackers. OpenSMTPD is part of the OpenBSD Project. The software is freely usable and re-usable by everyone under an ISC license.
This package uses standard "alternatives" mechanism, you may call "/usr/sbin/alternatives --set mta /usr/sbin/sendmail.opensmtpd" if you want to switch to OpenSMTPD MTA immediately after install, and "/usr/sbin/alternatives --set mta /usr/sbin/sendmail.sendmail" to revert back to Sendmail as a default mail daemon.
-------------------------------------------------------------------------------- Update Information:
Release 6.6.4p1 (2020-02-24) - An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group. Release 6.6.3p1 (2020-02-10) - Following the 6.6.2p1 release, various improvements were done in OpenBSD -current to mitigate the risk of similar bugs. -------------------------------------------------------------------------------- ChangeLog:
* Fri Apr 10 2020 Denis Fateyev denis@fateyev.com - 6.6.4p1-3 - Rebuilt for epel7 compatibility * Fri Feb 28 2020 Denis Fateyev denis@fateyev.com - 6.6.4p1-2 - Add "legacy_common_support" build option * Mon Feb 24 2020 Denis Fateyev denis@fateyev.com - 6.6.4p1-1 - Update to 6.6.4p1 release * Thu Jan 30 2020 Denis Fateyev denis@fateyev.com - 6.6.2p1-1 - Update to 6.6.2p1 release - Remove obsolete patch and spec cleanup * Wed Jan 29 2020 Fedora Release Engineering releng@fedoraproject.org - 6.0.3p1-9 - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild * Thu Jul 25 2019 Fedora Release Engineering releng@fedoraproject.org - 6.0.3p1-8 - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild * Fri Feb 1 2019 Fedora Release Engineering releng@fedoraproject.org - 6.0.3p1-7 - Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild * Mon Jan 14 2019 Bj��rn Esser besser82@fedoraproject.org - 6.0.3p1-6 - Rebuilt for libcrypt.so.2 (#1666033) -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1765905 - libasr-1.0.4 is available https://bugzilla.redhat.com/show_bug.cgi?id=1765905 [ 2 ] Bug #1797597 - CVE-2020-7247 opensmtpd: arbitrary commands execution in smtp_mailaddr in smtp_session.c via crafted SMTP session [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=1797597 [ 3 ] Bug #1801477 - opensmtpd-6.6.4p1 is available https://bugzilla.redhat.com/show_bug.cgi?id=1801477 [ 4 ] Bug #1806874 - CVE-2020-8793 opensmtpd: Reading of arbitrary file by unprivileged attacker can result in information disclosure or privilege escalation [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=1806874 [ 5 ] Bug #1809061 - CVE-2020-8794 opensmtpd: An out-of-bounds read could lead to remote code execution [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=1809061 --------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use su -c 'yum update opensmtpd' at the command line. For more information, refer to "YUM", available at https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7%5C /html/System_Administrators_Guide/ch-yum.html
All packages are signed with the Fedora EPEL GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------
epel-package-announce@lists.fedoraproject.org