what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2008-190

Mandriva Linux Security Advisory 2008-190
Posted Sep 11, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability in Postfix 2.4 and later was discovered, when running on Linux kernel 2.6, where a local user could cause a denial of service due to Postfix leaking the epoll file descriptor when executing non-Postfix commands. The updated packages have been patched to correct this issue.

tags | advisory, denial of service, kernel, local
systems | linux, mandriva
advisories | CVE-2008-3889
SHA-256 | 30dd0c3382d6efc30813809a595c32f255440c730554a3a912327ca876a4e2df

Mandriva Linux Security Advisory 2008-190

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:190
http://www.mandriva.com/security/
_______________________________________________________________________

Package : postfix
Date : September 10, 2008
Affected: 2008.0, 2008.1
_______________________________________________________________________

Problem Description:

A vulnerability in Postfix 2.4 and later was discovered, when
running on Linux kernel 2.6, where a local user could cause a denial
of service due to Postfix leaking the epoll file descriptor when
executing non-Postfix commands (CVE-2008-3889).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3889
http://www.postfix.org/announcements/20080902.html
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
c0bf5d528d5d41dcd2d20ebdb34d0cda 2008.0/i586/libpostfix1-2.4.5-2.2mdv2008.0.i586.rpm
fa944c0d7f0cbea926f535d510bf55d1 2008.0/i586/postfix-2.4.5-2.2mdv2008.0.i586.rpm
198798461aa8d36de69167dabf12e753 2008.0/i586/postfix-ldap-2.4.5-2.2mdv2008.0.i586.rpm
58655741a221fa54a33566568f3b4b82 2008.0/i586/postfix-mysql-2.4.5-2.2mdv2008.0.i586.rpm
a38a78d39fe49cfa5dd71ee4f5a8a2bd 2008.0/i586/postfix-pcre-2.4.5-2.2mdv2008.0.i586.rpm
6d26bd16aaab2333dc84a86b0595b31d 2008.0/i586/postfix-pgsql-2.4.5-2.2mdv2008.0.i586.rpm
da3f4b0d105461a2c0cc9d0ffdb8afbc 2008.0/SRPMS/postfix-2.4.5-2.2mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
028de47e6f9dd2a18be1afbfbfcc7b35 2008.0/x86_64/lib64postfix1-2.4.5-2.2mdv2008.0.x86_64.rpm
4e790bb1f1cb14e0eb008e8188c7d7f3 2008.0/x86_64/postfix-2.4.5-2.2mdv2008.0.x86_64.rpm
a843dc0ab9e22c27f1a83d3dd01139fd 2008.0/x86_64/postfix-ldap-2.4.5-2.2mdv2008.0.x86_64.rpm
9e50dfda594b6e6c270d001f5c020086 2008.0/x86_64/postfix-mysql-2.4.5-2.2mdv2008.0.x86_64.rpm
b27f29aa607246fa343244e783080dce 2008.0/x86_64/postfix-pcre-2.4.5-2.2mdv2008.0.x86_64.rpm
90992c9e66cbfa61adcc8f25af56bad0 2008.0/x86_64/postfix-pgsql-2.4.5-2.2mdv2008.0.x86_64.rpm
da3f4b0d105461a2c0cc9d0ffdb8afbc 2008.0/SRPMS/postfix-2.4.5-2.2mdv2008.0.src.rpm

Mandriva Linux 2008.1:
f7e093f905a77ffff051dd1f1719e70c 2008.1/i586/libpostfix1-2.5.1-2.2mdv2008.1.i586.rpm
17806bd3791473f79636f6e96aac3b16 2008.1/i586/postfix-2.5.1-2.2mdv2008.1.i586.rpm
ccbd6e6f134329f298da2e73ee924624 2008.1/i586/postfix-ldap-2.5.1-2.2mdv2008.1.i586.rpm
5e7501b1c226168794559a0c945c51ce 2008.1/i586/postfix-mysql-2.5.1-2.2mdv2008.1.i586.rpm
44482a44ec46d379cc90ec71b8d3da40 2008.1/i586/postfix-pcre-2.5.1-2.2mdv2008.1.i586.rpm
ed1ddf0451d015b1c85d09d438406c04 2008.1/i586/postfix-pgsql-2.5.1-2.2mdv2008.1.i586.rpm
d450d39e8073c6c9f1c9003f6189cf1a 2008.1/SRPMS/postfix-2.5.1-2.2mdv2008.1.src.rpm

Mandriva Linux 2008.1/X86_64:
f9a52469d5700428f6a2c606d2846299 2008.1/x86_64/lib64postfix1-2.5.1-2.2mdv2008.1.x86_64.rpm
5cb84c0ebe53a446efd208da355a9b4b 2008.1/x86_64/postfix-2.5.1-2.2mdv2008.1.x86_64.rpm
cdc066f4ebcd87b1902d330129ff5a87 2008.1/x86_64/postfix-ldap-2.5.1-2.2mdv2008.1.x86_64.rpm
4067143e300d124b20d7a24972c4ae22 2008.1/x86_64/postfix-mysql-2.5.1-2.2mdv2008.1.x86_64.rpm
65a6a8c5206d7a9c45b12557896cba58 2008.1/x86_64/postfix-pcre-2.5.1-2.2mdv2008.1.x86_64.rpm
b8d9b415787c02698fa29772942a2300 2008.1/x86_64/postfix-pgsql-2.5.1-2.2mdv2008.1.x86_64.rpm
d450d39e8073c6c9f1c9003f6189cf1a 2008.1/SRPMS/postfix-2.5.1-2.2mdv2008.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFIx+rLmqjQ0CJFipgRAuAOAJ9aBgcJBhECmuKoZUNfwNNc1jIuCwCfXO2S
zOSgJcz1VDJM8xHCoK3WQPM=
=Gg7G
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close