Debian: 2153-1: linux-2.6: privilege escalation/denial


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Debian: 2153-1: linux-2.6: privilege escalation/denial
# 1  
Old 01-30-2011
Debian: 2153-1: linux-2.6: privilege escalation/denial

LinuxSecurity.com: Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak. The Common Vulnerabilities and Exposures project identifies the following problems: [More...]

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
SHOWQ(8)						      System Manager's Manual							  SHOWQ(8)

NAME
showq - list the Postfix mail queue SYNOPSIS
showq [generic Postfix daemon options] DESCRIPTION
The showq daemon reports the Postfix mail queue status. It is the program that emulates the sendmail `mailq' command. The showq daemon can also be run in stand-alone mode by the super-user. This mode of operation is used to emulate the `mailq' command while the Postfix mail system is down. SECURITY
The showq daemon can run in a chroot jail at fixed low privilege, and takes no input from the client. Its service port is accessible to local untrusted users, so the service can be susceptible to denial of service attacks. STANDARDS
None. The showq daemon does not interact with the outside world. DIAGNOSTICS
Problems and transactions are logged to syslogd(8). BUGS
The showq daemon runs at a fixed low privilege; consequently, it cannot extract information from queue files in the maildrop directory. SEE ALSO
cleanup(8) canonicalize and enqueue mail pickup(8) local mail pickup service qmgr(8) mail being delivered, delayed mail syslogd(8) system logging LICENSE
The Secure Mailer license must be distributed with this software. AUTHOR(S) Wietse Venema IBM T.J. Watson Research P.O. Box 704 Yorktown Heights, NY 10598, USA SHOWQ(8)