Integer signedness error in the qmail_put and substdio_put functions in
qmail, when running on 64 bit platforms with a large amount of virtual
memory, allows remote attackers to cause a denial of service and possibly
execute arbitrary code via a large number of SMTP RCPT TO commands.
It was discovered that netqmail did not properly handle certain input. Both
remote and local attackers could use this vulnerability to cause netqmail to
crash or execute arbitrary code.
Upstream:released (1.06-6.2, 1.6-6.2~deb10u1, 1.6-6.2~deb9u1, 1.6-6.2~deb8u1,,,)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 20.04 LTS (Focal Fossa):released (1.06-6.2~deb10u1build0.20.04.1)
Ubuntu 20.10 (Groovy Gorilla):DNE
Source: qmail (LP Ubuntu Debian)
Upstream:released (1.03-38)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
More Information

Updated: 2020-10-08 00:14:25 UTC (commit 8c8bc3050753d19840baa87fd55f1038e5ae506e)