Описание
ELSA-2008-0839: postfix security update (MODERATE)
[2.3.3-2.1]
- fixed postfix privilege problem with symlinks in the mail spool directory (CVE-2008-2936) Resolves: rhbz#456717
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
postfix
2.3.3-2.1.el5_2
postfix-pflogsumm
2.3.3-2.1.el5_2
Oracle Linux x86_64
postfix
2.3.3-2.1.el5_2
postfix-pflogsumm
2.3.3-2.1.el5_2
Oracle Linux i386
postfix
2.3.3-2.1.el5_2
postfix-pflogsumm
2.3.3-2.1.el5_2
Связанные CVE
Связанные уязвимости
Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 bef ...
Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.