Linux repositories inspector

opensmtpd - Free implementation of the server-side SMTP protocol as defined by RFC 5321

OpenSMTPD is a FREE implementation of the server-side SMTP protocol as defined by RFC 5321, with some additional standard extensions. It allows ordinary machines to exchange e-mails with other systems speaking the SMTP protocol. Started out of dissatisfaction with other implementations, OpenSMTPD nowadays is a fairly complete SMTP implementation. OpenSMTPD is primarily developed by Gilles Chehade, Eric Faurot and Charles Longeau; with contributions from various OpenBSD hackers. OpenSMTPD is part of the OpenBSD Project. The software is freely usable and re-usable by everyone under an ISC license.
This package uses standard "alternatives" mechanism, you may call "/usr/sbin/alternatives --set mta /usr/sbin/sendmail.opensmtpd" if you want to switch to OpenSMTPD MTA immediately after install, and "/usr/sbin/alternatives --set mta /usr/sbin/sendmail.sendmail" to revert back to Sendmail as a default mail daemon.
Original maintainer
Homepagehttp://www.opensmtpd.org/
6.6.4p1
Arch iconArch rolling
Debian iconDebian 10.0
Fedora iconFedora rawhide
Ubuntu iconUbuntu 20.04
6.0.3p1
Debian iconDebian 10.0
Fedora iconFedora 28
Fedora iconFedora 29
Fedora iconFedora 30
Fedora iconFedora 31
Manjaro iconManjaro rolling
Ubuntu iconUbuntu 18.04 LTS
Ubuntu iconUbuntu 18.10
Ubuntu iconUbuntu 19.04
Ubuntu iconUbuntu 19.10
6.0.2p1
Debian iconDebian 9.0
Ubuntu iconUbuntu 17.10
5.7.3p2
Ubuntu iconUbuntu 16.04 LTS
DistributionVersionSincePackageInstalledPackager
Arch iconArch rolling community/oszst6.6.4p1-12020-02-24301 kiB908 kiB
Debian iconDebian 10.0 buster/maindeb6.0.3p1-5+deb10u32020-02-08255 kiB815 kiB
Debian iconDebian 10.0 buster-backports/maindeb6.6.4p1-1~bpo10+12020-02-25303 kiB1.05 MiB
Debian iconDebian 10.0 buster-proposed-updates/maindeb6.0.3p1-5+deb10u42020-03-05255 kiB815 kiB
Debian iconDebian 9.0 stretch/maindeb6.0.2p1-2+deb9u22020-02-08262 kiB807 kiB
Debian iconDebian 9.0 stretch-proposed-updates/maindeb6.0.2p1-2+deb9u32020-03-05262 kiB811 kiB
Fedora iconFedora 28 releases/Everything-osrpm6.0.3p1-2.fc282019-01-14278 kiB759 kiBFedora Project
Fedora iconFedora 29 releases/Everything-osrpm6.0.3p1-5.fc292019-01-14267 kiB788 kiBFedora Project
Fedora iconFedora 29 releases-test/Everything-osrpm6.0.3p1-5.fc292019-01-14267 kiB788 kiBFedora Project
Fedora iconFedora 30 releases/Everything-osrpm6.0.3p1-7.fc302019-06-17266 kiB991 kiBFedora Project
Fedora iconFedora 31 releases/Everything-osrpm6.0.3p1-8.fc312020-01-07286 kiB862 kiBFedora Project
Fedora iconFedora rawhide development/Everything-osrpm6.6.4p1-2.fc332020-03-03355 kiB1.07 MiBFedora Project
Manjaro iconManjaro rolling stable/communityxz6.0.3p1-22019-01-14234 kiB668 kiB
Manjaro iconManjaro rolling testing/communityxz6.0.3p1-22019-01-14234 kiB668 kiB
Manjaro iconManjaro rolling unstable/communityxz6.0.3p1-22019-01-14234 kiB668 kiB
Ubuntu iconUbuntu 17.10 artful/universedeb6.0.2p1-2build12017-11-10262 kiB812 kiB
Ubuntu iconUbuntu 18.04 LTS bionic/universedeb6.0.3p1-1build12018-02-07254 kiB793 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-security/universedeb6.0.3p1-1ubuntu0.22020-03-02255 kiB797 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-updates/universedeb6.0.3p1-1ubuntu0.22020-03-02255 kiB797 kiB
Ubuntu iconUbuntu 18.10 cosmic/universedeb6.0.3p1-42019-01-14254 kiB797 kiB
Ubuntu iconUbuntu 19.04 disco/universedeb6.0.3p1-52019-02-07255 kiB821 kiB
Ubuntu iconUbuntu 19.10 eoan/universedeb6.0.3p1-62019-08-19255 kiB829 kiB
Ubuntu iconUbuntu 19.10 eoan-security/universedeb6.0.3p1-6ubuntu0.22020-03-02255 kiB830 kiB
Ubuntu iconUbuntu 19.10 eoan-updates/universedeb6.0.3p1-6ubuntu0.22020-03-02255 kiB830 kiB
Ubuntu iconUbuntu 20.04 focal/universedeb6.6.4p1-12020-03-01299 kiB1.07 MiB
Ubuntu iconUbuntu 16.04 LTS xenial/universedeb5.7.3p2-12017-11-10259 kiB859 kiB

Manual pages

smtp(1)

smtp - Simple Mail Transfer Protocol client

smtp.opensmtpd(1)

smtp - Simple Mail Transfer Protocol client

aliases(5)

aliases - Postfix local alias database format

aliases.opensmtpd(5)

aliases - aliases file for smtpd

forward(5)

forward - email forwarding information file

smtpd.conf(5)

smtpd.conf - Simple Mail Transfer Protocol daemon configuration file

table(5)

table - format description for smtpd tables

makemap(8)

makemap - create database maps for sendmail

makemap.opensmtpd(8)

makemap - create database maps for smtpd

newaliases(8)

newaliases - rebuild mail aliases

newaliases.opensmtpd(8)

newaliases - rebuild mail aliases

sendmail(8)

sendmail - a mail enqueuer for smtpd(8)

sendmail.opensmtpd(8)

sendmail - a mail enqueuer for smtpd(8)

smtpctl(8)

smtpctl, mailq - control the Simple Mail Transfer Protocol daemon

smtpd(8)

smtpd - Simple Mail Transfer Protocol daemon

smtpd.opensmtpd(8)

smtpd - Simple Mail Transfer Protocol daemon

Latest updates

Debian icon

Debian 10.0 buster-proposed-updates/main: Version 6.0.3p1-5+deb10u4 introduced

2020-03-05
  • Fix LPE and RCE vulnerability (Closes: #952453) (CVE-2020-8794) An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group.
    OpenBSD 6.6 errata 021:
    https://ftp.openbsd.org/pub/OpenBSD/patches/6.6/common/021_smtpd_envelope.patch.sig
Debian icon

Debian 9.0 stretch-proposed-updates/main: Version 6.0.2p1-2+deb9u3 introduced

2020-03-05
  • Fix LPE and RCE vulnerability (Closes: #952453) (CVE-2020-8794) An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group.
    OpenBSD 6.6 errata 021:
    https://ftp.openbsd.org/pub/OpenBSD/patches/6.6/common/021_smtpd_envelope.patch.sig
Fedora icon

Fedora rawhide development/Everything-os: Updated from 6.0.3p1-8.fc31 to 6.6.4p1-2.fc33

2020-03-03
  • Add "legacy_common_support" build option
Ubuntu icon

Ubuntu 19.10 eoan-updates/universe: Updated from 6.0.3p1-6ubuntu0.1 to 6.0.3p1-6ubuntu0.2

2020-03-02
  • SECURITY UPDATE: Local privilege escalation, remote code execution
    • debian/patches/CVE-2020-8793_8794.patch: An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group.
  • CVE-2020-8793
  • CVE-2020-8794
Ubuntu icon

Ubuntu 19.10 eoan-security/universe: Updated from 6.0.3p1-6ubuntu0.1 to 6.0.3p1-6ubuntu0.2

2020-03-02
  • SECURITY UPDATE: Local privilege escalation, remote code execution
    • debian/patches/CVE-2020-8793_8794.patch: An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group.
  • CVE-2020-8793
  • CVE-2020-8794
Ubuntu icon

Ubuntu 18.04 LTS bionic-security/universe: Updated from 6.0.3p1-1ubuntu0.1 to 6.0.3p1-1ubuntu0.2

2020-03-02
  • SECURITY UPDATE: Local privilege escalation, remote code execution
    • debian/patches/CVE-2020-8793_8794.patch: An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group.
  • CVE-2020-8793
  • CVE-2020-8794
Ubuntu icon

Ubuntu 18.04 LTS bionic-updates/universe: Updated from 6.0.3p1-1ubuntu0.1 to 6.0.3p1-1ubuntu0.2

2020-03-02
  • SECURITY UPDATE: Local privilege escalation, remote code execution
    • debian/patches/CVE-2020-8793_8794.patch: An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group.
  • CVE-2020-8793
  • CVE-2020-8794
Ubuntu icon

Ubuntu 20.04 focal-proposed/universe: Version 6.6.4p1-1 removed

2020-03-01
Ubuntu icon

Ubuntu 20.04 focal/universe: Updated from 6.6.2p1-1 to 6.6.4p1-1

2020-03-01
  • New upstream release fixes critical security bug (Closes: #952453). Quoting from OpenBSD errata:

An out of bounds read in smtpd allows an attacker to inject arbitrary
commands into the envelope file which are then executed as root.

Separately, missing privilege revocation in smtpctl allows arbitrary
commands to be run with the _smtpq group.

  • Update copyright file with new copyright holders
  • Remove stale entries from Uploaders field
Ubuntu icon

Ubuntu 20.04 focal-proposed/universe: Version 6.6.4p1-1 introduced

2020-02-25
  • New upstream release fixes critical security bug (Closes: #952453). Quoting from OpenBSD errata:

An out of bounds read in smtpd allows an attacker to inject arbitrary
commands into the envelope file which are then executed as root.

Separately, missing privilege revocation in smtpctl allows arbitrary
commands to be run with the _smtpq group.

  • Update copyright file with new copyright holders
  • Remove stale entries from Uploaders field
Debian icon

Debian 10.0 buster-backports/main: Updated from 6.6.2p1-1~bpo10+1 to 6.6.4p1-1~bpo10+1

2020-02-25
  • Rebuild for buster-backports.
  • Fixes major security bug (Closes: #952453).
Arch icon

Arch rolling community/os: Updated from 6.6.3p1-1 to 6.6.4p1-1

2020-02-24
Arch icon

Arch rolling community/os: Updated from 6.6.2p1-1 to 6.6.3p1-1

2020-02-11
Debian icon

Debian 10.0 buster-proposed-updates/main: Version 6.0.3p1-5+deb10u3 removed

2020-02-08
Debian icon

Debian 10.0 buster/main: Updated from 6.0.3p1-5 to 6.0.3p1-5+deb10u3

2020-02-08
Debian icon

Debian 9.0 stretch-proposed-updates/main: Version 6.0.2p1-2+deb9u2 removed

2020-02-08
Debian icon

Debian 9.0 stretch/main: Updated from 6.0.2p1-2 to 6.0.2p1-2+deb9u2

2020-02-08
  • Fix following vulnerability, 018_smtpd_tls.patch.sig: smtpd can crash on opportunistic TLS downgrade, causing a denial of service.
Ubuntu icon

Ubuntu 19.10 eoan-updates/universe: Version 6.0.3p1-6ubuntu0.1 introduced

2020-02-05
  • SECURITY UPDATE: Arbitrary command execution as root
    • debian/patches/CVE-2020-7247.patch: Fix a security vulnerability discovered by Qualys which can lead to a privileges escalation on mbox deliveries and unprivileged code execution on lmtp deliveries, due to a logic issue causing a sanity check to be missed.
    • CVE-2020-7247
Ubuntu icon

Ubuntu 18.04 LTS bionic-updates/universe: Version 6.0.3p1-1ubuntu0.1 introduced

2020-02-05
  • SECURITY UPDATE: Arbitrary command execution as root
    • debian/patches/CVE-2020-7247.patch: Fix a security vulnerability discovered by Qualys which can lead to a privileges escalation on mbox deliveries and unprivileged code execution on lmtp deliveries, due to a logic issue causing a sanity check to be missed.
    • CVE-2020-7247
Ubuntu icon

Ubuntu 19.10 eoan-security/universe: Version 6.0.3p1-6ubuntu0.1 introduced

2020-02-05
  • SECURITY UPDATE: Arbitrary command execution as root
    • debian/patches/CVE-2020-7247.patch: Fix a security vulnerability discovered by Qualys which can lead to a privileges escalation on mbox deliveries and unprivileged code execution on lmtp deliveries, due to a logic issue causing a sanity check to be missed.
    • CVE-2020-7247

Related packages

opensmtpd-debuginfo - Debug information for package opensmtpd
opensmtpd-debugsource - Debug sources for package opensmtpd
opensmtpd-extras - addons for the OpenSMTPD SMTP server
opensmtpd-extras-experimental - experimental addons for the OpenSMTPD SMTP server
opensmtpd-filter-rspamd - OpenSMTPD filter integration for Rspamd
opensmtpd-filter-senderscore - OpenSMTPD filter integration for Sender Score
⇧ Top