[USN-4294-1] OpenSMTPD vulnerabilities
Mike Salvatore
mike.salvatore at canonical.com
Mon Mar 2 18:42:50 UTC 2020
==========================================================================
Ubuntu Security Notice USN-4294-1
March 02, 2020
OpenSMTPD vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.10
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in opensmtpd.
Software Description:
- opensmtpd: secure, reliable, lean, and easy-to configure SMTP server
Details:
It was discovered that OpenSMTPD mishandled certain input. A remote,
unauthenticated attacker could use this vulnerability to execute arbitrary
shell commands as any non-root user. (CVE-2020-8794)
It was discovered that OpenSMTPD did not properly handle hardlinks under
certain conditions. An unprivileged local attacker could read the first
line of any file on the filesystem. (CVE-2020-8793)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.10:
opensmtpd 6.0.3p1-6ubuntu0.2
Ubuntu 18.04 LTS:
opensmtpd 6.0.3p1-1ubuntu0.2
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4294-1
CVE-2020-8793, CVE-2020-8794
Package Information:
https://launchpad.net/ubuntu/+source/opensmtpd/6.0.3p1-6ubuntu0.2
https://launchpad.net/ubuntu/+source/opensmtpd/6.0.3p1-1ubuntu0.2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20200302/e17be446/attachment.sig>
More information about the ubuntu-security-announce
mailing list