DSA-4634-1 opensmtpd -- security update

Related Vulnerabilities: CVE-2020-8794  

Qualys discovered that the OpenSMTPD SMTP server performed insufficient validation of SMTP commands, which could result in local privilege escalation or the execution of arbitrary code. For the oldstable distribution (stretch), this problem has been fixed in version 6.0.2p1-2+deb9u3. For the stable distribution (buster), this problem has been fixed in version 6.0.3p1-5+deb10u4. We recommend that you upgrade your opensmtpd packages. For the detailed security status of opensmtpd please refer to its security tracker page at: https://security-tracker.debian.org/tracker/opensmtpd

Debian Security Advisory

DSA-4634-1 opensmtpd -- security update

Date Reported:
26 Feb 2020
Affected Packages:
opensmtpd
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 952453.
In Mitre's CVE dictionary: CVE-2020-8794.
More information:

Qualys discovered that the OpenSMTPD SMTP server performed insufficient validation of SMTP commands, which could result in local privilege escalation or the execution of arbitrary code.

For the oldstable distribution (stretch), this problem has been fixed in version 6.0.2p1-2+deb9u3.

For the stable distribution (buster), this problem has been fixed in version 6.0.3p1-5+deb10u4.

We recommend that you upgrade your opensmtpd packages.

For the detailed security status of opensmtpd please refer to its security tracker page at: https://security-tracker.debian.org/tracker/opensmtpd