Bug ID | 1164084 |
---|---|
Summary | Sendmail upstream security bug report |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.1 |
Hardware | All |
OS | openSUSE Factory |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Basesystem |
Assignee | bnc-team-screening@forge.provo.novell.com |
Reporter | werner@suse.com |
QA Contact | qa-bugs@suse.de |
Found By | --- |
Blocker | --- |
- Add upstream patch 8.15.2.mci.p0 * If sendmail tried to reuse an SMTP session which had already been closed by the server, then the connection cache could have invalid information about the session. One possible consequence was that STARTTLS was not used even if offered.