Issues fixed in this release (since 5.7.2):
Several vulnerabilities have been fixed in OpenSMTPD 5.7.2:
an oversight in the portable version of fgetln() that allows attackers to read and write out-of-bounds memory;
multiple denial-of-service vulnerabilities that allow local users to kill or hang OpenSMTPD;
a stack-based buffer overflow that allows local users to crash OpenSMTPD, or execute arbitrary code as the non-chrooted _smtpd user;
a hardlink attack (or race-conditioned symlink attack) that allows local users to unset the chflags() of arbitrary files;
a hardlink attack that allows local users to read the first line of arbitrary files (for example, root's hash from /etc/master.passwd);
a denial-of-service vulnerability that allows remote attackers to fill OpenSMTPD's queue or mailbox hard-disk partition;
an out-of-bounds memory read that allows remote attackers to crash OpenSMTPD, or leak information and defeat the ASLR protection;
a use-after-free vulnerability that allows remote attackers to crash OpenSMTPD, or execute arbitrary code as the non-chrooted _smtpd user;
Further details can be found in Qualys' audit report: http://seclists.org/oss-sec/2015/q4/17
MITRE has assigned one CVE for the use-after-free vulnerability; additional CVEs may be assigned: http://seclists.org/oss-sec/2015/q4/23
External References:
https://www.opensmtpd.org/announces/release-5.7.2.txt http://seclists.org/oss-sec/2015/q4/17
Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:
sudo dnf upgrade --refresh --advisory=FEDORA-2015-ed1c673f09
Please log in to add feedback.
This update has been submitted for testing by dfateyev.
This update has obsoleted opensmtpd-5.7.2p1-1.fc23, and has inherited its bugs and notes.
dfateyev edited this update.
This update has been pushed to testing.
This update has reached 3 days in testing and can be pushed to stable now if the maintainer wishes
This update has been submitted for stable by dfateyev.
This update has been pushed to stable.