Logwatch does not handle "improper command pipelining after (NOOP|RSET)"

Solution Verified - Updated -

Environment

  • Red Hat Enterprise Linux 6
  • logwatch-7.3.6-49.el6

Issue

  • After adding "reject_unauth_pipelining" to "smtpd_recipient_restrictions" in main.cf and send some spam mail,
    Logwatch does not handle "improper command pipelining after (NOOP|RSET)"

Resolution

Bug is fixed in logwatch-7.3.6-52 and errata RHBA-2013-1247 is released.

Root Cause

  • There is bugzilla existing for this issue: Bug 894185
    https://bugzilla.redhat.com/show_bug.cgi?id=894185

This solution is part of Red Hat’s fast-track publication program, providing a huge library of solutions that Red Hat engineers have created while supporting our customers. To give you the knowledge you need the instant it becomes available, these articles may be presented in a raw and unedited form.

Comments