Bug 683168

Summary: CVE-2011-0411 postfix: SMTP commands injection during plaintext to TLS session switch [fedora-all]
Product: [Fedora] Fedora Reporter: Jan Lieskovsky <jlieskov>
Component: postfixAssignee: Jaroslav Škarvada <jskarvad>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: medium    
Version: 14CC: jskarvad, mlichvar
Target Milestone: ---Keywords: Security, SecurityTracking
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: postfix-2.7.3-1.fc13 Doc Type: Release Note
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-03-23 22:59:02 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 674814    
Attachments:
Description Flags
Experimental test script none

Description Jan Lieskovsky 2011-03-08 18:04:44 UTC
This is an automatically created tracking bug!  It was created to ensure
that one or more security vulnerabilities are fixed in affected Fedora
versions.

For comments that are specific to the vulnerability please use bugs filed
against "Security Response" product referenced in the "Blocks" field.

For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs

When creating a Bodhi update request, please include the bug IDs of the
respective parent bugs filed against the "Security Response" product.
Please mention CVE ids in the RPM changelog when available.

Bodhi update submission link:
https://admin.fedoraproject.org/updates/new/?type_=security&bugs=674814

Please note: this issue affects multiple supported versions of Fedora.
Only one tracking bug has been filed; please only close it when all
affected versions are fixed.


[bug automatically created by: add-tracking-bugs]

Comment 1 Jaroslav Škarvada 2011-03-14 10:43:07 UTC
Created attachment 484139 [details]
Experimental test script

Running it on production system is not recommended - the cleaning phase is very vague and it doesn't bring your system to the state before test.

Usage: you need repos for binary RPMs and sources. If the SRPM repo is disabled, it will be temporally enabled during the test. The test takes a while, because it creates reproducer from the openssl package and recompiles it, then it installs it with the release number set to 99 (it is left on your system after the test, you can return to the distro version by e.g. yum downgrade openssl). The script returns 0 on PASS (the bug was not reproduced) or 1 on FAIL (the bug was reproduced) or 2 in case there were error(s) while setting up the testing environment.

Comment 2 Fedora Update System 2011-03-14 10:48:47 UTC
postfix-2.7.3-1.fc14 has been submitted as an update for Fedora 14.
https://admin.fedoraproject.org/updates/postfix-2.7.3-1.fc14

Comment 3 Fedora Update System 2011-03-14 11:00:19 UTC
postfix-2.7.3-1.fc13 has been submitted as an update for Fedora 13.
https://admin.fedoraproject.org/updates/postfix-2.7.3-1.fc13

Comment 4 Fedora Update System 2011-03-23 22:58:57 UTC
postfix-2.7.3-1.fc14 has been pushed to the Fedora 14 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 5 Fedora Update System 2011-03-23 22:59:15 UTC
postfix-2.7.3-1.fc13 has been pushed to the Fedora 13 stable repository.  If problems still persist, please make note of it in this bug report.