-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2020-b92d7083ca 2020-03-16 20:26:14.974158 --------------------------------------------------------------------------------
Name : opensmtpd Product : Fedora 32 Version : 6.6.4p1 Release : 2.fc32 URL : http://www.opensmtpd.org/ Summary : Free implementation of the server-side SMTP protocol as defined by RFC 5321 Description : OpenSMTPD is a FREE implementation of the server-side SMTP protocol as defined by RFC 5321, with some additional standard extensions. It allows ordinary machines to exchange e-mails with other systems speaking the SMTP protocol. Started out of dissatisfaction with other implementations, OpenSMTPD nowadays is a fairly complete SMTP implementation. OpenSMTPD is primarily developed by Gilles Chehade, Eric Faurot and Charles Longeau; with contributions from various OpenBSD hackers. OpenSMTPD is part of the OpenBSD Project. The software is freely usable and re-usable by everyone under an ISC license.
This package uses standard "alternatives" mechanism, you may call "/usr/sbin/alternatives --set mta /usr/sbin/sendmail.opensmtpd" if you want to switch to OpenSMTPD MTA immediately after install, and "/usr/sbin/alternatives --set mta /usr/sbin/sendmail.sendmail" to revert back to Sendmail as a default mail daemon.
-------------------------------------------------------------------------------- Update Information:
Release 6.6.4p1 (2020-02-24) --- - An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group. Release 6.6.3p1 (2020-02-10) --- - Following the 6.6.2p1 release, various improvements were done in OpenBSD -current to mitigate the risk of similar bugs. -------------------------------------------------------------------------------- ChangeLog:
* Fri Feb 28 2020 Denis Fateyev denis@fateyev.com - 6.6.4p1-2 - Add "legacy_common_support" build option * Mon Feb 24 2020 Denis Fateyev denis@fateyev.com - 6.6.4p1-1 - Update to 6.6.4p1 release * Thu Jan 30 2020 Denis Fateyev denis@fateyev.com - 6.6.2p1-1 - Update to 6.6.2p1 release - Remove obsolete patch and spec cleanup * Wed Jan 29 2020 Fedora Release Engineering releng@fedoraproject.org - 6.0.3p1-9 - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild * Thu Jul 25 2019 Fedora Release Engineering releng@fedoraproject.org - 6.0.3p1-8 - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild * Fri Feb 1 2019 Fedora Release Engineering releng@fedoraproject.org - 6.0.3p1-7 - Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild * Mon Jan 14 2019 Bj��rn Esser besser82@fedoraproject.org - 6.0.3p1-6 - Rebuilt for libcrypt.so.2 (#1666033) * Thu Aug 16 2018 Denis Fateyev denis@fateyev.com - 6.0.3p1-5 - Fixed initscript and service files - Switched from libdb4 to libdb where possible * Fri Jul 13 2018 Fedora Release Engineering releng@fedoraproject.org - 6.0.3p1-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild * Fri May 4 2018 Denis Fateyev denis@fateyev.com - 6.0.3p1-3 - Rebuild to fix libevent version bump -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1801477 - opensmtpd-6.6.4p1 is available https://bugzilla.redhat.com/show_bug.cgi?id=1801477 [ 2 ] Bug #1809060 - CVE-2020-8794 opensmtpd: An out-of-bounds read could lead to remote code execution [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1809060 [ 3 ] Bug #1797596 - CVE-2020-7247 opensmtpd: arbitrary commands execution in smtp_mailaddr in smtp_session.c via crafted SMTP session [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1797596 [ 4 ] Bug #1806873 - CVE-2020-8793 opensmtpd: Reading of arbitrary file by unprivileged attacker can result in information disclosure or privilege escalation [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1806873 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2020-b92d7083ca' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------