Summary: | <mail-mta/postfix-3.1.6: privilege escalation via postfix set-gid programs | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Thomas Deutschmann (RETIRED) <whissi> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | net-mail+disabled |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.postfix.org/announcements/postfix-3.2.2.html | ||
Whiteboard: | A1 [glsa] | ||
Package list: |
mail-mta/postfix-3.1.6
|
Runtime testing required: | --- |
Description
Thomas Deutschmann (RETIRED)
![]() @ Arches, please test and mark stable: =mail-mta/postfix-3.1.6 amd64 stable ia64 stable x86 stable Stable on alpha. ppc stable ppc64 stable arm stable sparc stable Arches, please finish stabilizing hppa Gentoo Security Padawan ChrisADR hppa stable. Last arch is done. New GLSA Request filed. @Maintainers please remove vulnerable versions. Gentoo Security Padawan ChrisADR This issue was resolved and addressed in GLSA 201709-20 at https://security.gentoo.org/glsa/201709-20 by GLSA coordinator Aaron Bauman (b-man). re-opened for cleanup |