Package: opensmtpd
Version: 6.6.2p1-1
Severity: critical
Tags: upstream

OpenBSD 6.6 errata 021, February 24, 2020:

An out of bounds read in smtpd allows an attacker to inject arbitrary
commands into the envelope file which are then executed as root.
Separately, missing privilege revocation in smtpctl allows arbitrary
commands to be run with the _smtpq group.

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable'), (1, 
'experimental-debug'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.4.0-4-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_CA.UTF-8), LANGUAGE=en_CA.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set 
to en_CA.UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages opensmtpd depends on:
ii  adduser                3.118
ii  debconf [debconf-2.0]  1.5.73
ii  ed                     1.16-1
ii  init-system-helpers    1.57
ii  libasr0                1.0.2-2+b1
ii  libc6                  2.29-6
ii  libcrypt1              1:4.4.10-7
ii  libdb5.3               5.3.28+dfsg1-0.6
ii  libevent-2.1-7         2.1.11-stable-1
ii  libpam0g               1.3.1-5
ii  libssl1.1              1.1.1d-2
ii  lsb-base               11.1.0
ii  zlib1g                 1:1.2.11.dfsg-1.2

Versions of packages opensmtpd recommends:
ii  opensmtpd-extras  6.6.0-1

Versions of packages opensmtpd suggests:
ii  ca-certificates  20190110

-- Configuration Files:
/etc/smtpd.conf changed [not included]

-- debconf information excluded

-- 
|)|/  Ryan Kavanagh      | GPG: 4E46 9519 ED67 7734 268F
|\|\  https://rak.ac     |      BD95 8F7B F8FC 4A11 C97A

Attachment: signature.asc
Description: PGP signature

Reply via email to