An input validation error in sendmail has been discovered by Cade Cairns of SecurityFocus. This problem can be exploited by local users to gain root access. It is not exploitable by remote attackers without shell access. New packages based on sendmail.8.11.6 have been prepared for Slackware 7.1 and 8.0. Detailed information about this security problem may be found here: New procmail packages have been prepared as well, based on procmail-3.21. The ChangeLog notes that these problems were fixed as of procmail-3.20, but it's not known how serious they really are: - SECURITY: don't do unsafe things from signal handlers: - ignore TRAP when terminating because of a signal - resolve the host and protocol of COMSAT when it is set - save the absolute path form of $LASTFOLDER for the comsat message when it is set - only use the log buffer if it's safe WHERE TO FIND THE NEW PACKAGES: ------------------------------- Updated packages for Slackware 8.0: Updated packages for Slackware 7.1: MD5 SIGNATURES: --------------- Here are the md5sums for the packages: Slackware 8.0 packages: 56099f1bce9643e44342711878a7ceb0 ./packages/procmail.tgz 3d03fd648ecf40eed56ff915780fb8ab ./packages/sendmail.tgz 1a13d98a11d0af853893a640909d8958 ./packages/smailcfg.tgz Slackware 7.1 packages: 121f13cecaaac0efdc1b510b68e6c147 ./packages/procmail.tgz 7c0e57969057ba72e6b59e26aa39de04 ./packages/sendmail.tgz 9e30e9e07fce4001bbf7f330cb2f9d71 ./packages/smailcfg.tgz INSTALLATION INSTRUCTIONS: -------------------------- First, kill any existing sendmail processes: killall -9 sendmail Then, as root, upgrade the sendmail package with upgradepkg: upgradepkg sendmail.tgz Then, restart sendmail: /usr/sbin/sendmail -bd -q15m - Slackware Linux Security Team The Slackware Linux Project