stable

opensmtpd-5.7.3p1-1.el7

FEDORA-EPEL-2015-13c5827d5c created by dfateyev 10 years ago for Fedora EPEL 7

Issues fixed in this release (since 5.7.2):

  • fix an mda buffer truncation bug which allows a user to create forward files that pass session checks but fail delivery later down the chain, within the user mda;
  • fix remote buffer overflow in unprivileged pony process;
  • reworked offline enqueue to better protect against hardlink attacks.

Several vulnerabilities have been fixed in OpenSMTPD 5.7.2:

  • an oversight in the portable version of fgetln() that allows attackers to read and write out-of-bounds memory;

  • multiple denial-of-service vulnerabilities that allow local users to kill or hang OpenSMTPD;

  • a stack-based buffer overflow that allows local users to crash OpenSMTPD, or execute arbitrary code as the non-chrooted _smtpd user;

  • a hardlink attack (or race-conditioned symlink attack) that allows local users to unset the chflags() of arbitrary files;

  • a hardlink attack that allows local users to read the first line of arbitrary files (for example, root's hash from /etc/master.passwd);

  • a denial-of-service vulnerability that allows remote attackers to fill OpenSMTPD's queue or mailbox hard-disk partition;

  • an out-of-bounds memory read that allows remote attackers to crash OpenSMTPD, or leak information and defeat the ASLR protection;

  • a use-after-free vulnerability that allows remote attackers to crash OpenSMTPD, or execute arbitrary code as the non-chrooted _smtpd user;

Further details can be found in Qualys' audit report: http://seclists.org/oss-sec/2015/q4/17

MITRE has assigned one CVE for the use-after-free vulnerability; additional CVEs may be assigned: http://seclists.org/oss-sec/2015/q4/23

External References:

https://www.opensmtpd.org/announces/release-5.7.2.txt http://seclists.org/oss-sec/2015/q4/17

This update has been submitted for testing by dfateyev.

10 years ago

This update has obsoleted opensmtpd-5.7.2p1-1.el7, and has inherited its bugs and notes.

10 years ago

dfateyev edited this update.

10 years ago

This update has been pushed to testing.

10 years ago

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

10 years ago

This update has been submitted for stable by dfateyev.

10 years ago

This update has been pushed to stable.

10 years ago

Please log in to add feedback.

Metadata
Type
security
Severity
urgent
Karma
0
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
1
Stable by Time
disabled
Dates
submitted
10 years ago
in testing
10 years ago
in stable
10 years ago
modified
10 years ago
BZ#1268509 opensmtpd: 5.7.2 release available
0
0
BZ#1268795 CVE-2015-7687 OpenSMTPD: multiple vulnerabilities fixed in 5.7.2 [epel-all]
0
0
BZ#1268837 opensmtpd-5.7.3 is available
0
0
BZ#1268858 opensmtpd: Remotely triggerable buffer overflow vulnerability in filter_tx_io [epel-all]
0
0

Automated Test Results