SuSEConfig helps configure and reconfigure SuSE Linux systems. The SuSEConfig.postfix script is designed to set up the Postfix mail daemon, and includes the option to create a chroot environment for the Postfix processes. By default, the chroot directory is /var/spool/postfix. Later in the script, a recursive chmod call sets all files within the /var/spool/postfix directory to be owned by the postfix user. This includes the /var/spool/postfix/maildrop/ directory, which is used by the Postfix sendmail compatibility program to insert local mail into the system. If this occurs after a message is created in this directory, but before it is rejected by the Postfix postdrop process, it will be impossible for postdrop to delete this message. As a result, disk space may be filled up by a local user, possibly leading to a DoS situation. This is only a problem if Postfix is installed without a world writable maildrop directory, as described in the Postfix installation documentation.
SuSEConfig helps configure and reconfigure SuSE Linux systems. The SuSEConfig.postfix script is designed to set up the Postfix mail daemon, and includes the option to create a chroot environment for the Postfix processes. By default, the chroot directory is /var/spool/postfix. Later in the script, a recursive chmod call sets all files within the /var/spool/postfix directory to be owned by the postfix user. This includes the /var/spool/postfix/maildrop/ directory, which is used by the Postfix sendmail compatibility program to insert local mail into the system. If this occurs after a message is created in this directory, but before it is rejected by the Postfix postdrop process, it will be impossible for postdrop to delete this message. As a result, disk space may be filled up by a local user, possibly leading to a DoS situation. This is only a problem if Postfix is installed without a world writable maildrop directory, as described in the Postfix installation documentation.