Advisories
Mandriva Advisories
|
![]() |
Problem Description |
A race condition was reported in sendmail in how it handles
asynchronous signals. This could allow a remote attacker to be able
to execute arbitrary code with the privileges of the user running
sendmail.
The updated packages have been patched to correct this problem via a
patch provided by the Sendmail Consortium via CERT.
Updated Packages |
Corporate Server 3.0
be7c8df48bcf0790c64ac389b37754cb corporate/3.0/RPMS/sendmail-8.12.11-1.1.C30mdk.i586.rpm 631dfdb5d0fc43185af6084e17714ffb corporate/3.0/RPMS/sendmail-cf-8.12.11-1.1.C30mdk.i586.rpm 96b84769e995ac2595cb8d7ae4918b91 corporate/3.0/RPMS/sendmail-devel-8.12.11-1.1.C30mdk.i586.rpm 58337a123a60b64e6f414de744959337 corporate/3.0/RPMS/sendmail-doc-8.12.11-1.1.C30mdk.i586.rpm 3d46a60520cc65d595c17db6bae809c7 corporate/3.0/SRPMS/sendmail-8.12.11-1.1.C30mdk.src.rpm
Corporate Server 3.0/X86_64
c22a4c20960c29b647532b4d966234b1 x86_64/corporate/3.0/RPMS/sendmail-8.12.11-1.1.C30mdk.x86_64.rpm ee7aad2adb440347519f5888200e923d x86_64/corporate/3.0/RPMS/sendmail-cf-8.12.11-1.1.C30mdk.x86_64.rpm 6d0b3c65952995c3f12b076134c8a8e8 x86_64/corporate/3.0/RPMS/sendmail-devel-8.12.11-1.1.C30mdk.x86_64.rpm c2e31e2fa472f4bb34db27526c25cc92 x86_64/corporate/3.0/RPMS/sendmail-doc-8.12.11-1.1.C30mdk.x86_64.rpm 3d46a60520cc65d595c17db6bae809c7 x86_64/corporate/3.0/SRPMS/sendmail-8.12.11-1.1.C30mdk.src.rpm
Multi Network Firewall 2.0
d1f8e453ab9456d0bb7f34acf1388d3c mnf/2.0/RPMS/sendmail-8.12.11-1.1.M20mdk.i586.rpm 6b0f02721103c1b25622e3d54e474c19 mnf/2.0/RPMS/sendmail-cf-8.12.11-1.1.M20mdk.i586.rpm 03f66672c6792fcf40d84a1dc4b686ef mnf/2.0/RPMS/sendmail-devel-8.12.11-1.1.M20mdk.i586.rpm b966f80b82cd054474ec43e9ff3be679 mnf/2.0/RPMS/sendmail-doc-8.12.11-1.1.M20mdk.i586.rpm 244093bf42df7c6db16246c56b7e6495 mnf/2.0/SRPMS/sendmail-8.12.11-1.1.M20mdk.src.rpm
Mandriva Linux LE2005
95305a1dfe64cfeabdca98fb008cfd91 10.2/RPMS/sendmail-8.13.3-2.1.102mdk.i586.rpm 5215408069e99b0ff2994db3af55d62e 10.2/RPMS/sendmail-cf-8.13.3-2.1.102mdk.i586.rpm 02deae8e6e131ac7cb847e9ab47a9885 10.2/RPMS/sendmail-devel-8.13.3-2.1.102mdk.i586.rpm 356978837f0dbf3ab9dcce39e9f58f7d 10.2/RPMS/sendmail-doc-8.13.3-2.1.102mdk.i586.rpm 9bff19f2f9b0b8502bf5f27dd2895f8e 10.2/SRPMS/sendmail-8.13.3-2.1.102mdk.src.rpm
Mandriva Linux LE2005/X86_64
f148c878ea5b30370fc94e6a7255de5d x86_64/10.2/RPMS/sendmail-8.13.3-2.1.102mdk.x86_64.rpm 3968115b895ce937e2d4e2180d577168 x86_64/10.2/RPMS/sendmail-cf-8.13.3-2.1.102mdk.x86_64.rpm 0f6226a324a5285b1ce81ce699de723b x86_64/10.2/RPMS/sendmail-devel-8.13.3-2.1.102mdk.x86_64.rpm 461e896f92cdd4cea5f0ba56c68ba7a9 x86_64/10.2/RPMS/sendmail-doc-8.13.3-2.1.102mdk.x86_64.rpm 9bff19f2f9b0b8502bf5f27dd2895f8e x86_64/10.2/SRPMS/sendmail-8.13.3-2.1.102mdk.src.rpm
Mandriva Linux 2006
12616264669772849dc402ae7425229a 2006.0/RPMS/sendmail-8.13.4-6.1.20060mdk.i586.rpm d551d0ed690a5f3da78842071472d386 2006.0/RPMS/sendmail-cf-8.13.4-6.1.20060mdk.i586.rpm 79c647c58c53c27e1a2555f5af71ef37 2006.0/RPMS/sendmail-devel-8.13.4-6.1.20060mdk.i586.rpm 94fd6a9ffa27388a80e5e1d1cb9543ed 2006.0/RPMS/sendmail-doc-8.13.4-6.1.20060mdk.i586.rpm a996c91d8899ecb76ff1d961c6c0177a 2006.0/SRPMS/sendmail-8.13.4-6.1.20060mdk.src.rpm
Mandriva Linux 2006/X86_64
7768a1368faf4890343b97ef868aae78 x86_64/2006.0/RPMS/sendmail-8.13.4-6.1.20060mdk.x86_64.rpm 35f33c64846459eeca8587f7150d3978 x86_64/2006.0/RPMS/sendmail-cf-8.13.4-6.1.20060mdk.x86_64.rpm a70a4dc0ef6944f43614f83e742a80a2 x86_64/2006.0/RPMS/sendmail-devel-8.13.4-6.1.20060mdk.x86_64.rpm aaa7adbd147cab2bbad3bea812eb32c2 x86_64/2006.0/RPMS/sendmail-doc-8.13.4-6.1.20060mdk.x86_64.rpm a996c91d8899ecb76ff1d961c6c0177a x86_64/2006.0/SRPMS/sendmail-8.13.4-6.1.20060mdk.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058
http://www.kb.cert.org/vuls/id/834865
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.