Red Hat Bugzilla – Bug 53161
Sendmail security problems
Last modified: 2007-03-26 23:48:31 EDT
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010808
Description of problem:
Version-Release number of selected component (if applicable):
The current version of sendmail available for RH 6.2 is 8.9.3, and here's a
list of security holes from 8.9.3 that were fixed in 8.10.0:
SECURITY: The safe file checks now back track through symbolic
links to make sure the files can't be compromised due
to poor permissions on the parent directories of the
symbolic link target.
SECURITY: Only root, TrustedUser, and users in class t can rebuild
the alias map. Problem noted by Michal Zalewski of the
"Internet for Schools" project (IdS).
SECURITY: There is a potential for a denial of service attack if
the AutoRebuildAliases option is set as a user can kill the
sendmail process while it is rebuilding the aliases file
(leaving it in an inconsistent state). This option and
its use is deprecated and will be removed from a future
version of sendmail.
SECURITY: Make sure all file descriptors (besides stdin, stdout,
and stderr) are closed before restarting sendmail. Problem
noted by Michal Zalewski of the "Internet for Schools"
All versions of Sendmail prior to 8.11.6 have other security problems as
well. The 8.11.6 release contains fixes Bugtraq IDs #2794 and #3163 which
are a DoS attack and local root compromise, respectively. When are you
planning to have 8.11.6 RPMs for Red Hat 6.2?
There should be an errata in the next day or so for all releases concerning
sendmail. QA is done and it is being pushed out. Please reopen this bug report
if it doesnt show up soon.