--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2020-b92d7083ca
2020-03-16 20:26:14.974158
--------------------------------------------------------------------------------
Name : opensmtpd
Product : Fedora 32
Version : 6.6.4p1
Release : 2.fc32
URL :
http://www.opensmtpd.org/
Summary : Free implementation of the server-side SMTP protocol as defined by RFC 5321
Description :
OpenSMTPD is a FREE implementation of the server-side SMTP protocol as defined
by RFC 5321, with some additional standard extensions. It allows ordinary
machines to exchange e-mails with other systems speaking the SMTP protocol.
Started out of dissatisfaction with other implementations, OpenSMTPD nowadays
is a fairly complete SMTP implementation. OpenSMTPD is primarily developed
by Gilles Chehade, Eric Faurot and Charles Longeau; with contributions from
various OpenBSD hackers. OpenSMTPD is part of the OpenBSD Project.
The software is freely usable and re-usable by everyone under an ISC license.
This package uses standard "alternatives" mechanism, you may call
"/usr/sbin/alternatives --set mta /usr/sbin/sendmail.opensmtpd"
if you want to switch to OpenSMTPD MTA immediately after install, and
"/usr/sbin/alternatives --set mta /usr/sbin/sendmail.sendmail" to revert
back to Sendmail as a default mail daemon.
--------------------------------------------------------------------------------
Update Information:
Release 6.6.4p1 (2020-02-24) --- - An out of bounds read in smtpd allows an
attacker to inject arbitrary commands into the envelope file which are then
executed as root. Separately, missing privilege revocation in smtpctl allows
arbitrary commands to be run with the _smtpq group. Release 6.6.3p1
(2020-02-10) --- - Following the 6.6.2p1 release, various improvements were
done in OpenBSD -current to mitigate the risk of similar bugs.
--------------------------------------------------------------------------------
ChangeLog:
* Fri Feb 28 2020 Denis Fateyev <denis(a)fateyev.com> - 6.6.4p1-2
- Add "legacy_common_support" build option
* Mon Feb 24 2020 Denis Fateyev <denis(a)fateyev.com> - 6.6.4p1-1
- Update to 6.6.4p1 release
* Thu Jan 30 2020 Denis Fateyev <denis(a)fateyev.com> - 6.6.2p1-1
- Update to 6.6.2p1 release
- Remove obsolete patch and spec cleanup
* Wed Jan 29 2020 Fedora Release Engineering <releng(a)fedoraproject.org> - 6.0.3p1-9
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
* Thu Jul 25 2019 Fedora Release Engineering <releng(a)fedoraproject.org> - 6.0.3p1-8
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
* Fri Feb 1 2019 Fedora Release Engineering <releng(a)fedoraproject.org> - 6.0.3p1-7
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
* Mon Jan 14 2019 Bj��rn Esser <besser82(a)fedoraproject.org> - 6.0.3p1-6
- Rebuilt for libcrypt.so.2 (#1666033)
* Thu Aug 16 2018 Denis Fateyev <denis(a)fateyev.com> - 6.0.3p1-5
- Fixed initscript and service files
- Switched from libdb4 to libdb where possible
* Fri Jul 13 2018 Fedora Release Engineering <releng(a)fedoraproject.org> - 6.0.3p1-4
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Fri May 4 2018 Denis Fateyev <denis(a)fateyev.com> - 6.0.3p1-3
- Rebuild to fix libevent version bump
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1801477 - opensmtpd-6.6.4p1 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1801477
[ 2 ] Bug #1809060 - CVE-2020-8794 opensmtpd: An out-of-bounds read could lead to remote
code execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1809060
[ 3 ] Bug #1797596 - CVE-2020-7247 opensmtpd: arbitrary commands execution in
smtp_mailaddr in smtp_session.c via crafted SMTP session [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1797596
[ 4 ] Bug #1806873 - CVE-2020-8793 opensmtpd: Reading of arbitrary file by unprivileged
attacker can result in information disclosure or privilege escalation [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1806873
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-b92d7083ca' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------