stable

opensmtpd-5.7.3p1-1.fc23

FEDORA-2015-ed1c673f09 created by dfateyev 9 years ago for Fedora 23

Issues fixed in this release (since 5.7.2):

  • fix an mda buffer truncation bug which allows a user to create forward files that pass session checks but fail delivery later down the chain, within the user mda;
  • fix remote buffer overflow in unprivileged pony process;
  • reworked offline enqueue to better protect against hardlink attacks.

Several vulnerabilities have been fixed in OpenSMTPD 5.7.2:

  • an oversight in the portable version of fgetln() that allows attackers to read and write out-of-bounds memory;

  • multiple denial-of-service vulnerabilities that allow local users to kill or hang OpenSMTPD;

  • a stack-based buffer overflow that allows local users to crash OpenSMTPD, or execute arbitrary code as the non-chrooted _smtpd user;

  • a hardlink attack (or race-conditioned symlink attack) that allows local users to unset the chflags() of arbitrary files;

  • a hardlink attack that allows local users to read the first line of arbitrary files (for example, root's hash from /etc/master.passwd);

  • a denial-of-service vulnerability that allows remote attackers to fill OpenSMTPD's queue or mailbox hard-disk partition;

  • an out-of-bounds memory read that allows remote attackers to crash OpenSMTPD, or leak information and defeat the ASLR protection;

  • a use-after-free vulnerability that allows remote attackers to crash OpenSMTPD, or execute arbitrary code as the non-chrooted _smtpd user;

Further details can be found in Qualys' audit report: http://seclists.org/oss-sec/2015/q4/17

MITRE has assigned one CVE for the use-after-free vulnerability; additional CVEs may be assigned: http://seclists.org/oss-sec/2015/q4/23

External References:

https://www.opensmtpd.org/announces/release-5.7.2.txt http://seclists.org/oss-sec/2015/q4/17

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2015-ed1c673f09

This update has been submitted for testing by dfateyev.

9 years ago

This update has obsoleted opensmtpd-5.7.2p1-1.fc23, and has inherited its bugs and notes.

9 years ago

dfateyev edited this update.

9 years ago

This update has been pushed to testing.

9 years ago

This update has reached 3 days in testing and can be pushed to stable now if the maintainer wishes

9 years ago

This update has been submitted for stable by dfateyev.

9 years ago

This update has been pushed to stable.

9 years ago

Please log in to add feedback.

Metadata
Type
security
Severity
urgent
Karma
0
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
1
Stable by Time
disabled
Dates
submitted
9 years ago
in testing
9 years ago
in stable
9 years ago
modified
9 years ago
BZ#1268509 opensmtpd: 5.7.2 release available
0
0
BZ#1268794 CVE-2015-7687 OpenSMTPD: multiple vulnerabilities fixed in 5.7.2 [fedora-all]
0
0
BZ#1268837 opensmtpd-5.7.3 is available
0
0
BZ#1268857 opensmtpd: Remotely triggerable buffer overflow vulnerability in filter_tx_io [fedora-all]
0
0

Automated Test Results