Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Patches » RHBA-2013:0054-01

Overview

Id RHBA-2013:0054-01
Name Red Hat 2013:0054-01 RHBA postfix bug fix and enhancement update for RHEL 5 x86
Vendor Name red_hat
Product None
Content Type Recommended Recommended
Language(s)
Operating System(s) Linux 
Released On 07 Jan 2013 12:00:00

RHBA-2013:0054-01

Red Hat 2013:0054-01 RHBA postfix bug fix and enhancement update for RHEL 5 x86

Vendor Name

red_hat

Product

None

Released On

07 Jan 2013 12:00:00

Url

https://rhn.redhat.com/errata/RHBA-2013-0054.html

Description

LSAC(v2)
The postfix packages provide a Mail Transport Agent (MTA), which supports protocols like LDAP, SMTP AUTH (SASL), and TLS. This update fixes the following bugs: * Prior to this update, upstream example scripts were not included. This update adds these upstream example scripts to the postfix package. (BZ#251677) * Prior to this update, the recipient duplicate elimination did not work correctly. As a consequence, users with multiple virtual aliases could receive multiple copies of emails. This update modifies the underlying code so that the recipient duplicate elimination will work as expected if the "enable_original_recipient" configuration option is set to "no". Now, users will no longer receive multiple copies of emails. (BZ#474541) * Prior to this update, the postconf documentation contained ambiguous information about "reject_invalid_helo_hostname" restrictions. This update modifies the postconf documentation and the "reject_invalid_helo_hostname" parameter is now documented without ambiguity . (BZ#514948) * Prior to this update, the milter (mail filter) communication failed for headers that are larger than 64 kB. Further milter processing of the email was blocked. Now, this update modifies the underlying code so that the long headers are truncated to 60000 characters or less before milter processing. Now, milter processes these large headers as expected. (BZ#617069) * Prior to this update, the postfix init script looked for any process named "master" when checking whether the postfix daemon was running. As a consequence, the script could be tricked by any other process named "master", which could lead to problems. This update modifies the init script to check for the process ID (PID) which is more robust. (BZ#645348) * Prior to this update, the manual pages for the command line tools "mailq", "newaliases", "sendmail" and "aliases" were not supported by alternatives. As a consequence, these man pages could not be displayed. This update adds support for these manual pages to the alternatives list. (BZ#664627) * Prior to this update, the biff notification code did not set the FD_CLOEXEC file descriptor flag on created UDP sockets. As a consequence, the postfix agent could leak file descriptors (FD) to the local delivery agent (LDA) and to other processes spawned by LDA. This update modifies the underlying code to set the FD_CLOEXEC as expected. (BZ#766499) This update also adds the following enhancement: * Prior to this update, the postfix agent did not support MySQL. This update adds MySQL support to postfix. (BZ#502412) All users of postfix are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.

Related Resources

Related Vulnerabilities

None

Related Patches

None

Superseded Patches

None


Last Updated: 27 May 2016 11:16:08