安全公告详情

NS-SA-2025-0220

2025-09-30 16:49:52

简介

important: postfix/systemd security update

严重级别

important

主题

An update for postfix/systemd is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

postfix:
systemd:


Security Fix(es):
postfix: Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.(CVE-2008-2936)
postfix: Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.(CVE-2008-2937)
postfix: Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of "non-Postfix" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file.(CVE-2008-3889)
postfix: The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.(CVE-2011-1720)
postfix: bugfix
systemd: -resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.(CVE-2017-9217)
systemd: An out-of-bounds write flaw was found in the way systemd-resolved daemon handled processing of DNS responses. A remote attacker could potentially use this flaw to crash the daemon or execute arbitrary code in the context of the daemon process.(CVE-2017-9445)
systemd: It was discovered that systemd is vulnerable to a state injection attack when deserializing the state of a service. Properties longer than LINE_MAX are not correctly parsed and an attacker may abuse this flaw in particularly configured services to inject, change, or corrupt the service state.(CVE-2018-15686)
systemd: It has been discovered that systemd-tmpfiles mishandles symbolic links present in non-terminal path components. In some configurations a local user could use this vulnerability to get access to arbitrary files when the systemd-tmpfiles command is run.(CVE-2018-6954)
systemd: A heap use-after-free vulnerability was found in systemd, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.(CVE-2020-1712)
systemd: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.01B6.

影响组件

  • postfix
  • systemd

影响产品

  • CGSL MAIN 6.06

更新包

{"fix":[{"product":"CGSL MAIN 6.06","pkgs":[{"binary":["postfix-3.5.8-4.zncgsl6.x86_64.rpm"],"source":"postfix-3.5.8-4.zncgsl6.src.rpm"},{"binary":["systemd-239-58.0.4.zncgsl6_6.8.t1.0.x86_64.rpm","systemd-container-239-58.0.4.zncgsl6_6.8.t1.0.x86_64.rpm","systemd-devel-239-58.0.4.zncgsl6_6.8.t1.0.x86_64.rpm","systemd-libs-239-58.0.4.zncgsl6_6.8.t1.0.x86_64.rpm","systemd-pam-239-58.0.4.zncgsl6_6.8.t1.0.x86_64.rpm","systemd-udev-239-58.0.4.zncgsl6_6.8.t1.0.x86_64.rpm"],"source":"systemd-239-58.0.4.zncgsl6_6.8.t1.0.src.rpm"}]}]}

CVE

参考