sendmail (8.15.2-22+deb11u3) bullseye; urgency=medium
Sendmail was affected by SMTP smuggling (CVE-2023-51765).
Remote attackers can use a published exploitation technique
to inject e-mail messages with a spoofed MAIL FROM address,
allowing bypass of an SPF protection mechanism.
This occurs because sendmail supports some combinaison of
<CR><LF><NUL>.
.
This particular injection vulnerability has been closed,
unfortunately full closure need to reject mail that
contain NUL.
.
This is slighly non conformant with RFC and could
be opt-out by setting confREJECT_NUL to 'false'
in sendmail.mc file.
-- Bastien Roucariès <rouca(a)debian.org> Sun, 12 May 2024 19:38:09 +0000
ERROR OCCURED IN JOB: update_and_clean_index (APP: hyperkitty)
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/django_extensions/management/commands/runjobs.py", line 40, in runjobs
job().execute()
File "/usr/lib/python3/dist-packages/hyperkitty/jobs/update_and_clean_index.py", line 37, in execute
run_with_lock(update_index, remove=True)
File "/usr/lib/python3/dist-packages/hyperkitty/lib/utils.py", line 181, in run_with_lock
log.exception("Failed to update the fulltext index: %s", e)
File "/usr/lib/python3/dist-packages/flufl/lock/_lockfile.py", line 447, in __exit__
self.unlock()
File "/usr/lib/python3/dist-packages/flufl/lock/_lockfile.py", line 398, in unlock
raise NotLockedError('Already unlocked')
flufl.lock._lockfile.NotLockedError: Already unlocked
ERROR OCCURED IN JOB: update_and_clean_index (APP: hyperkitty)
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/django_extensions/management/commands/runjobs.py", line 40, in runjobs
job().execute()
File "/usr/lib/python3/dist-packages/hyperkitty/jobs/update_and_clean_index.py", line 37, in execute
run_with_lock(update_index, remove=True)
File "/usr/lib/python3/dist-packages/hyperkitty/lib/utils.py", line 181, in run_with_lock
log.exception("Failed to update the fulltext index: %s", e)
File "/usr/lib/python3/dist-packages/flufl/lock/_lockfile.py", line 447, in __exit__
self.unlock()
File "/usr/lib/python3/dist-packages/flufl/lock/_lockfile.py", line 398, in unlock
raise NotLockedError('Already unlocked')
flufl.lock._lockfile.NotLockedError: Already unlocked
Failed to renew certificate humans.sudoroom.org with error: urn:ietf:params:acme:error:serverInternal :: The server experienced an internal error :: Error retrieving account "https://acme-v01.api.letsencrypt.org/acme/reg/13725021"
All renewals failed. The following certificates could not be renewed:
/etc/letsencrypt/live/humans.sudoroom.org/fullchain.pem (failure)
1 renew failure(s), 0 parse failure(s)
Does anyone know Ajay Tallam? They were asking about helping with the Omni
website on Slack and I wonder if we should give them access, or maybe run it
by the delegates meeting first. I think they've been to Sudoroom but they're
not a member?
on Slack as uhjai:
Who's in charge of editing the website? Happy to help with that. I just
noticed that the 'book an event' and 'return to booking instructions' link on
the event request form both say that omni is closed to events due to shelter
in place. https://omnicommons.org/blog/request/
-jake