CVE-2020-35679
Summary
| CVE | CVE-2020-35679 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-12-24 16:15:00 UTC |
| Updated | 2023-11-07 03:22:00 UTC |
| Description | smtpd/table.c in OpenSMTPD before 6.8.0p1 lacks a certain regfree, which might allow attackers to trigger a "very significant" memory leak via messages to an instance that performs many regex lookups. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] Fedora 32 Update: opensmtpd-6.8.0p2-1.fc32 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| Use regfree after we're done with preg. · openbsd/src@79a034b · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| [SECURITY] Fedora 33 Update: opensmtpd-6.8.0p2-1.fc33 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| [SECURITY] Fedora 33 Update: opensmtpd-6.8.0p2-1.fc33 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| OpenSMTPD: Multiple vulnerabilities (GLSA 202105-12) — Gentoo security |
GENTOO |
security.gentoo.org |
|
| December 2020: OpenSMTPD 6.8.0p1 released, fixed several bugs, proposed several diffs, book is on Github - poolp.org |
MISC |
poolp.org |
Third Party Advisory |
| Announce: OpenSMTPD 6.8.0p1 released |
MISC |
www.mail-archive.com |
Release Notes, Third Party Advisory |
| [SECURITY] Fedora 32 Update: opensmtpd-6.8.0p2-1.fc32 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| Announce: OpenSMTPD 6.8.0p1 released |
|
www.mail-archive.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 500483 Alpine Linux Security Update for opensmtpd
- 501462 Alpine Linux Security Update for opensmtpd
- 710103 Gentoo Linux OpenSMTPD Multiple vulnerabilities (GLSA 202105-12)