Summary: | <mail-mta/exim-4.72: DoS/PrivEsc ('hardlink' vulnerability) (CVE-2010-{2023,2024}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Alex Legler (RETIRED) <a3li> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | dhp_gentoo, grobian, net-mail+disabled |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://seclists.org/fulldisclosure/2010/Jun/88 | ||
Whiteboard: | A3 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 325645 | ||
Bug Blocks: |
Description
Alex Legler (RETIRED)
![]() ![]() ![]() I'll try to put exim-4.72 in the tree today or tomorrow. Updated package is in the tree. Grobian will be testing it for a few days and report back. It runs smoothly for me here. I haven't seen any irregularities, feels good to me. Arches, please test and mark stable: =mail-mta/exim-4.72 Target keywords : "alpha amd64 hppa ia64 ppc ppc64 sparc x86" Tested on x86, looks good over here. x86 stable, thanks Andreas! Stable for HPPA. alpha/ia64/sparc stable CVE-2010-2023 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2023): transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file. CVE-2010-2024 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2024): transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/. @amd64: please stabilise exim-4.72. I'm running amd64 (without issues), so you should be good to go. amd64 stable Markus: see bug 325645 : it does not build on AMD64 for me. ppc64 done Marked ppc stable. glsa request filed. The remote code exec bug is fixed in >=4.70 (http://bugs.exim.org/show_bug.cgi?id=787) but was initially not regarded as a security problem according to heise. @net-mail: please punt <4.70. versions <4.70 dropped This issue was resolved and addressed in GLSA 201401-32 at http://security.gentoo.org/glsa/glsa-201401-32.xml by GLSA coordinator Mikle Kolyada (Zlogene). |