- Issued:
- 2013-01-07
- Updated:
- 2013-01-07
RHBA-2013:0054 - Bug Fix Advisory
Synopsis
postfix bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated postfix packages that fix multiple bugs and add one enhancement are now
available for Red Hat Enterprise Linux 5.
Description
The postfix packages provide a Mail Transport Agent (MTA), which supports
protocols like LDAP, SMTP AUTH (SASL), and TLS.
This update fixes the following bugs:
- Prior to this update, upstream example scripts were not included. This update
adds these upstream example scripts to the postfix package. (BZ#251677)
- Prior to this update, the recipient duplicate elimination did not work
correctly. As a consequence, users with multiple virtual aliases could receive
multiple copies of emails. This update modifies the underlying code so that the
recipient duplicate elimination will work as expected if the
"enable_original_recipient" configuration option is set to "no". Now, users will
no longer receive multiple copies of emails. (BZ#474541)
- Prior to this update, the postconf documentation contained ambiguous
information about "reject_invalid_helo_hostname" restrictions. This update
modifies the postconf documentation and the "reject_invalid_helo_hostname"
parameter is now documented without ambiguity . (BZ#514948)
- Prior to this update, the milter (mail filter) communication failed for
headers that are larger than 64 kB. Further milter processing of the email was
blocked. Now, this update modifies the underlying code so that the long headers
are truncated to 60000 characters or less before milter processing. Now, milter
processes these large headers as expected. (BZ#617069)
- Prior to this update, the postfix init script looked for any process named
"master" when checking whether the postfix daemon was running. As a consequence,
the script could be tricked by any other process named "master", which could
lead to problems. This update modifies the init script to check for the process
ID (PID) which is more robust. (BZ#645348)
- Prior to this update, the manual pages for the command line tools "mailq",
"newaliases", "sendmail" and "aliases" were not supported by alternatives. As a
consequence, these man pages could not be displayed. This update adds support
for these manual pages to the alternatives list. (BZ#664627)
- Prior to this update, the biff notification code did not set the FD_CLOEXEC
file descriptor flag on created UDP sockets. As a consequence, the postfix agent
could leak file descriptors (FD) to the local delivery agent (LDA) and to other
processes spawned by LDA. This update modifies the underlying code to set the
FD_CLOEXEC as expected. (BZ#766499)
This update also adds the following enhancement:
- Prior to this update, the postfix agent did not support MySQL. This update
adds MySQL support to postfix. (BZ#502412)
All users of postfix are advised to upgrade to these updated packages, which fix
these bugs and add this enhancement.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 251677 - example scripts missing
- BZ - 474541 - Duplicate recipient filter fails on virtual alias expansion
- BZ - 502412 - Postfix MySQL map support
- BZ - 514948 - Postfix documentation needs clarification on helo hostname parameter
- BZ - 645348 - Postfix init script 'status' not very robust
- BZ - 664627 - mailq manpage does not display
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
postfix-2.3.3-6.el5.src.rpm | SHA-256: 757e547fd0a19e75be278f3af0842f6a825522405b69215e58ce755ae8655c2b |
x86_64 | |
postfix-2.3.3-6.el5.x86_64.rpm | SHA-256: 92264e531d8b8e861ac6fd3258185ae5374608d1ddda9f98734a75713eb581dc |
postfix-debuginfo-2.3.3-6.el5.x86_64.rpm | SHA-256: 868eebbe3e6a242f32ed952d57ce0dc9255bf09f5fa759533f0ca7d439ab8033 |
postfix-pflogsumm-2.3.3-6.el5.x86_64.rpm | SHA-256: d5f3a2250565d7b3be56bd719b2cd329c9fdea6dfe02ad6d53f9d7b1114793c4 |
ia64 | |
postfix-2.3.3-6.el5.ia64.rpm | SHA-256: 7166e224d13818683f42cb8b2f9ab108a3cf10843952e5c069f367e7944a2bba |
postfix-debuginfo-2.3.3-6.el5.ia64.rpm | SHA-256: 9a89d159d0e5794be3f74d9dd988312f075317ec8e89e2e95734534da2747212 |
postfix-pflogsumm-2.3.3-6.el5.ia64.rpm | SHA-256: a89a0a1a9fefd977862cb8605022790b9c331dce6fa399613b0d6ae64c153d26 |
i386 | |
postfix-2.3.3-6.el5.i386.rpm | SHA-256: c7dd57bd72a1c7e9b0f5f28235ad61bf63ad568e27199fa7a755b91504514e41 |
postfix-debuginfo-2.3.3-6.el5.i386.rpm | SHA-256: dacc9d7eee6e7e64dc3e4d5e5a0a98847a3736651a65ac052a8558e81bac2b34 |
postfix-pflogsumm-2.3.3-6.el5.i386.rpm | SHA-256: 70fd9ab3424863f137440417a717b2c2d2fb05ad62e60ebe05453884b4c41641 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
postfix-2.3.3-6.el5.src.rpm | SHA-256: 757e547fd0a19e75be278f3af0842f6a825522405b69215e58ce755ae8655c2b |
x86_64 | |
postfix-2.3.3-6.el5.x86_64.rpm | SHA-256: 92264e531d8b8e861ac6fd3258185ae5374608d1ddda9f98734a75713eb581dc |
postfix-debuginfo-2.3.3-6.el5.x86_64.rpm | SHA-256: 868eebbe3e6a242f32ed952d57ce0dc9255bf09f5fa759533f0ca7d439ab8033 |
postfix-pflogsumm-2.3.3-6.el5.x86_64.rpm | SHA-256: d5f3a2250565d7b3be56bd719b2cd329c9fdea6dfe02ad6d53f9d7b1114793c4 |
i386 | |
postfix-2.3.3-6.el5.i386.rpm | SHA-256: c7dd57bd72a1c7e9b0f5f28235ad61bf63ad568e27199fa7a755b91504514e41 |
postfix-debuginfo-2.3.3-6.el5.i386.rpm | SHA-256: dacc9d7eee6e7e64dc3e4d5e5a0a98847a3736651a65ac052a8558e81bac2b34 |
postfix-pflogsumm-2.3.3-6.el5.i386.rpm | SHA-256: 70fd9ab3424863f137440417a717b2c2d2fb05ad62e60ebe05453884b4c41641 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
postfix-2.3.3-6.el5.src.rpm | SHA-256: 757e547fd0a19e75be278f3af0842f6a825522405b69215e58ce755ae8655c2b |
x86_64 | |
postfix-2.3.3-6.el5.x86_64.rpm | SHA-256: 92264e531d8b8e861ac6fd3258185ae5374608d1ddda9f98734a75713eb581dc |
postfix-debuginfo-2.3.3-6.el5.x86_64.rpm | SHA-256: 868eebbe3e6a242f32ed952d57ce0dc9255bf09f5fa759533f0ca7d439ab8033 |
postfix-pflogsumm-2.3.3-6.el5.x86_64.rpm | SHA-256: d5f3a2250565d7b3be56bd719b2cd329c9fdea6dfe02ad6d53f9d7b1114793c4 |
i386 | |
postfix-2.3.3-6.el5.i386.rpm | SHA-256: c7dd57bd72a1c7e9b0f5f28235ad61bf63ad568e27199fa7a755b91504514e41 |
postfix-debuginfo-2.3.3-6.el5.i386.rpm | SHA-256: dacc9d7eee6e7e64dc3e4d5e5a0a98847a3736651a65ac052a8558e81bac2b34 |
postfix-pflogsumm-2.3.3-6.el5.i386.rpm | SHA-256: 70fd9ab3424863f137440417a717b2c2d2fb05ad62e60ebe05453884b4c41641 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
postfix-2.3.3-6.el5.src.rpm | SHA-256: 757e547fd0a19e75be278f3af0842f6a825522405b69215e58ce755ae8655c2b |
s390x | |
postfix-2.3.3-6.el5.s390x.rpm | SHA-256: 890052389d097da86fa5b519ce07e7e5b3b443c714cfb7bfdaf506b078336161 |
postfix-debuginfo-2.3.3-6.el5.s390x.rpm | SHA-256: f3089bb43bd7fbadb453e8f97e808977a4216a9dea9c561e0417b463a00f0a26 |
postfix-pflogsumm-2.3.3-6.el5.s390x.rpm | SHA-256: b9504f46095e9cf44c627127ed9dc228dda10dfab4db68d2ba61ff79c0f65eab |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
postfix-2.3.3-6.el5.src.rpm | SHA-256: 757e547fd0a19e75be278f3af0842f6a825522405b69215e58ce755ae8655c2b |
ppc | |
postfix-2.3.3-6.el5.ppc.rpm | SHA-256: 160a5f6e5187d0bb74ab4230c8de85f6790cde3a37bcaef1ac266a412db09814 |
postfix-debuginfo-2.3.3-6.el5.ppc.rpm | SHA-256: fed10b8ef417aeb3f66e8c0c1648c307fbf9405b28ec4ae247120b9fa61b5940 |
postfix-pflogsumm-2.3.3-6.el5.ppc.rpm | SHA-256: a45d9cec8b39ab1ce10909e501b0286f2acf083a8fbfe0c5ed36f3ac73cd8f52 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
postfix-2.3.3-6.el5.src.rpm | SHA-256: 757e547fd0a19e75be278f3af0842f6a825522405b69215e58ce755ae8655c2b |
x86_64 | |
postfix-2.3.3-6.el5.x86_64.rpm | SHA-256: 92264e531d8b8e861ac6fd3258185ae5374608d1ddda9f98734a75713eb581dc |
postfix-debuginfo-2.3.3-6.el5.x86_64.rpm | SHA-256: 868eebbe3e6a242f32ed952d57ce0dc9255bf09f5fa759533f0ca7d439ab8033 |
postfix-pflogsumm-2.3.3-6.el5.x86_64.rpm | SHA-256: d5f3a2250565d7b3be56bd719b2cd329c9fdea6dfe02ad6d53f9d7b1114793c4 |
i386 | |
postfix-2.3.3-6.el5.i386.rpm | SHA-256: c7dd57bd72a1c7e9b0f5f28235ad61bf63ad568e27199fa7a755b91504514e41 |
postfix-debuginfo-2.3.3-6.el5.i386.rpm | SHA-256: dacc9d7eee6e7e64dc3e4d5e5a0a98847a3736651a65ac052a8558e81bac2b34 |
postfix-pflogsumm-2.3.3-6.el5.i386.rpm | SHA-256: 70fd9ab3424863f137440417a717b2c2d2fb05ad62e60ebe05453884b4c41641 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.