Upstream released version 8.14.9 of sendmail [1] which fixes one security related bug by properly closing file descriptors (except stdin, stdout, and stderr) before executing programs. This bug could enable local users to interfere with an open SMTP connection if they can execute their own program for mail delivery (e.g., via procmail or the prog mailer). [1]: http://www.sendmail.com/sm/open_source/download/8.14.9/?show_rs=1
Created attachment 900848 [details] patch generated from diff of 8.14.8 to 8.14.9 I can't find a CVS repository for sendmail, so this was generated by manually diffing and removing everything that was obviously not related. This seems to be the required patch.
Thanks for the diff. Will you open Fedora / RHEL bugs? Several places were already covered by selinux, that's the purpose of e.g. milterfdleaks patch, which now seems to be obsoleted.
CVE request: http://seclists.org/oss-sec/2014/q2/400
MITRE assigned CVE-2014-3956 to this issue: http://seclists.org/oss-sec/2014/q2/426
Created sendmail tracking bugs for this issue: Affects: fedora-all [bug 1104553]
sendmail-8.14.8-2.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
sendmail-8.14.7-2.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
Statement: This issue affects the versions of sendmail as shipped with Red Hat Enterprise Linux 4, 5, 6, and 7. Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.