buffer overflow in w_read function (possible DoS and execution of arbitary code)
Bug #136687 reported by
Daniel Hahler
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
postfix-policyd (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Dapper |
Invalid
|
Undecided
|
Daniel Hahler | ||
Edgy |
Invalid
|
Undecided
|
Daniel Hahler | ||
Feisty |
Fix Released
|
High
|
Kees Cook | ||
Gutsy |
Fix Released
|
Undecided
|
Daniel Hahler |
Bug Description
Binary package hint: postfix-policyd
Theres a security issue with postfix-policyd, which needs to be fixed for Feisty.
See bug 132088 for the sync from Debian to Gutsy.
There are no ubuntu changes and the security fix is the only change from Debian.
Unfortunately, there appears to be a bug, which causes upgrades to fail (bug 91607), when postfix-policyd is already running.
Related branches
CVE References
Changed in postfix-policyd: | |
status: | New → Fix Released |
importance: | Undecided → High |
status: | New → Confirmed |
Changed in postfix-policyd: | |
assignee: | nobody → blueyed |
status: | Incomplete → Invalid |
status: | Incomplete → Invalid |
assignee: | nobody → blueyed |
assignee: | nobody → blueyed |
To post a comment you must log in.
Here is the changeset for the fix: http:// svn.linuxrulz. org/WebSVN/ listing. php?repname= Policyd& path=%2Ftrunk% 2F&rev= 4&sc=1