--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2020-ede50a3d8b
2020-04-30 00:47:55.126597
--------------------------------------------------------------------------------
Name : opensmtpd
Product : Fedora EPEL 7
Version : 6.6.4p1
Release : 3.el7
URL :
http://www.opensmtpd.org/
Summary : Free implementation of the server-side SMTP protocol as defined by RFC 5321
Description :
OpenSMTPD is a FREE implementation of the server-side SMTP protocol as defined
by RFC 5321, with some additional standard extensions. It allows ordinary
machines to exchange e-mails with other systems speaking the SMTP protocol.
Started out of dissatisfaction with other implementations, OpenSMTPD nowadays
is a fairly complete SMTP implementation. OpenSMTPD is primarily developed
by Gilles Chehade, Eric Faurot and Charles Longeau; with contributions from
various OpenBSD hackers. OpenSMTPD is part of the OpenBSD Project.
The software is freely usable and re-usable by everyone under an ISC license.
This package uses standard "alternatives" mechanism, you may call
"/usr/sbin/alternatives --set mta /usr/sbin/sendmail.opensmtpd"
if you want to switch to OpenSMTPD MTA immediately after install, and
"/usr/sbin/alternatives --set mta /usr/sbin/sendmail.sendmail" to revert
back to Sendmail as a default mail daemon.
--------------------------------------------------------------------------------
Update Information:
Release 6.6.4p1 (2020-02-24) - An out of bounds read in smtpd allows an
attacker to inject arbitrary commands into the envelope file which are then
executed as root. Separately, missing privilege revocation in smtpctl allows
arbitrary commands to be run with the _smtpq group. Release 6.6.3p1
(2020-02-10) - Following the 6.6.2p1 release, various improvements were done in
OpenBSD -current to mitigate the risk of similar bugs.
--------------------------------------------------------------------------------
ChangeLog:
* Fri Apr 10 2020 Denis Fateyev <denis(a)fateyev.com> - 6.6.4p1-3
- Rebuilt for epel7 compatibility
* Fri Feb 28 2020 Denis Fateyev <denis(a)fateyev.com> - 6.6.4p1-2
- Add "legacy_common_support" build option
* Mon Feb 24 2020 Denis Fateyev <denis(a)fateyev.com> - 6.6.4p1-1
- Update to 6.6.4p1 release
* Thu Jan 30 2020 Denis Fateyev <denis(a)fateyev.com> - 6.6.2p1-1
- Update to 6.6.2p1 release
- Remove obsolete patch and spec cleanup
* Wed Jan 29 2020 Fedora Release Engineering <releng(a)fedoraproject.org> - 6.0.3p1-9
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
* Thu Jul 25 2019 Fedora Release Engineering <releng(a)fedoraproject.org> - 6.0.3p1-8
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
* Fri Feb 1 2019 Fedora Release Engineering <releng(a)fedoraproject.org> - 6.0.3p1-7
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
* Mon Jan 14 2019 Bj��rn Esser <besser82(a)fedoraproject.org> - 6.0.3p1-6
- Rebuilt for libcrypt.so.2 (#1666033)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1765905 - libasr-1.0.4 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1765905
[ 2 ] Bug #1797597 - CVE-2020-7247 opensmtpd: arbitrary commands execution in
smtp_mailaddr in smtp_session.c via crafted SMTP session [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1797597
[ 3 ] Bug #1801477 - opensmtpd-6.6.4p1 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1801477
[ 4 ] Bug #1806874 - CVE-2020-8793 opensmtpd: Reading of arbitrary file by unprivileged
attacker can result in information disclosure or privilege escalation [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1806874
[ 5 ] Bug #1809061 - CVE-2020-8794 opensmtpd: An out-of-bounds read could lead to remote
code execution [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1809061
--------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use
su -c 'yum update opensmtpd' at the command line.
For more information, refer to "YUM", available at
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7\
/html/System_Administrators_Guide/ch-yum.html
All packages are signed with the Fedora EPEL GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------