|
|
Log in / Subscribe / Register

Ubuntu alert USN-4268-1 (OpenSMTPD)

From:  Mike Salvatore <mike.salvatore@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-4268-1] OpenSMTPD vulnerability
Date:  Wed, 5 Feb 2020 09:26:06 -0500
Message-ID:  <96963c5a-5427-399b-f27a-96c4ffeda9f8@canonical.com>

========================================================================== Ubuntu Security Notice USN-4268-1 February 05, 2020 OpenSMTPD vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 19.10 - Ubuntu 18.04 LTS Summary: OpenSMTPD could be made to run programs as root if it received specially crafted input over the network. Software Description: - opensmtpd: secure, reliable, lean, and easy-to configure SMTP server Details: It was discovered that OpenSMTPD incorrectly verified the sender's or receiver's e-mail addresses under certain conditions. An attacker could use this vulnerability to execute arbitrary commands as root. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 19.10: opensmtpd 6.0.3p1-6ubuntu0.1 Ubuntu 18.04 LTS: opensmtpd 6.0.3p1-1ubuntu0.1 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4268-1 CVE-2020-7247 Package Information: https://launchpad.net/ubuntu/+source/opensmtpd/6.0.3p1-6u... https://launchpad.net/ubuntu/+source/opensmtpd/6.0.3p1-1u... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds