Summary: | <mail-mta/sendmail-8.14.9: Properly set the close-on-exec flag for file descriptors (CVE-2014-3956) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | net-mail+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1102174 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2014-05-29 07:51:43 UTC
+*sendmail-8.14.9 (30 May 2014) + + 30 May 2014; Eray Aslan <eras@gentoo.org> +sendmail-8.14.9.ebuild: + Security bump - bug #511760 + Arches, please test and mark stable =mail-mta/sendmail-8.14.9. Target keywords: "alpha amd64 arm hppa ia64 ~mips ppc ppc64 ~s390 ~sh sparc x86" amd64 stable Stable for HPPA. alpha stable arm stable ia64 stable ppc64 stable ppc stable sparc stable x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Arches, Thank you for your work Maintainer(s), please drop the vulnerable version. New GLSA Request filed. CVE-2014-3956 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3956): The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program. Maintainer(s), Thank you for cleanup! This issue was resolved and addressed in GLSA 201412-32 at http://security.gentoo.org/glsa/glsa-201412-32.xml by GLSA coordinator Mikle Kolyada (Zlogene). |