Package: opensmtpd / 6.0.3p1-5+deb10u4

Metadata

Package Version Patches format
opensmtpd 6.0.3p1-5+deb10u4 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
07_automake_missing_options.diff | (download)

configure.ac | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 add the missing automake options
 * foreign : don't complain about missing NEWS/README/AUTHORS/etc files
 * subdir-objects
10_smtpd.conf.diff | (download)

smtpd/smtpd.conf | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 update path to aliases file on debian
11_ssl_1.1.diff | (download)

openbsd-compat/libressl.c | 17 7 + 10 - 0 !
smtpd/ca.c | 290 247 + 43 - 0 !
smtpd/crypto.c | 64 36 + 28 - 0 !
smtpd/libressl.c | 17 7 + 10 - 0 !
smtpd/ssl.c | 2 1 + 1 - 0 !
smtpd/ssl.h | 14 14 + 0 - 0 !
6 files changed, 312 insertions(+), 92 deletions(-)

 enable support for openssl 1.1
018_smtpd_tls.patch.sig | (download)

smtpd/mta_session.c | 30 5 + 25 - 0 !
1 file changed, 5 insertions(+), 25 deletions(-)

 fix denial of service attack
 OpenBSD 6.6 errata 018, January 30, 2020:
 .
 smtpd can crash on opportunistic TLS downgrade, causing a denial of service.
019_smtpd_exec.patch.sig | (download)

smtpd/smtp_session.c | 28 13 + 15 - 0 !
1 file changed, 13 insertions(+), 15 deletions(-)

 fix privilege escalation bug
 OpenBSD 6.6 errata 019, January 30, 2020:
 .
 An incorrect check allows an attacker to trick mbox delivery into executing
 arbitrary commands as root and lmtp delivery into executing arbitrary commands
 as an unprivileged user.
021_952453.diff | (download)

mk/pathnames | 3 1 + 2 - 0 !
smtpd/makemap.c | 11 8 + 3 - 0 !
smtpd/mta_session.c | 8 4 + 4 - 0 !
smtpd/queue_fs.c | 3 1 + 2 - 0 !
smtpd/smtpctl.c | 2 1 + 1 - 0 !
smtpd/smtpd-defines.h | 6 6 + 0 - 0 !
smtpd/smtpd.c | 31 24 + 7 - 0 !
smtpd/smtpd.h | 5 3 + 2 - 0 !
8 files changed, 48 insertions(+), 21 deletions(-)

 fix arbitrary command execution vulnerability
 OpenBSD 6.6 errata 021, February 24, 2020:

 An out of bounds read in smtpd allows an attacker to inject arbitrary
 commands into the envelope file which are then executed as root.
 Separately, missing privilege revocation in smtpctl allows arbitrary
 commands to be run with the _smtpq group.

 https://ftp.openbsd.org/pub/OpenBSD/patches/6.6/common/021_smtpd_envelope.patch.sig

 This patch is NOT the above errata patch. Rather, it was generated
 from the upstream git repository as follows: