View Issue Details

IDProjectCategoryView StatusLast Update
0014569CentOS-6sendmailpublic2018-03-09 23:30
Reportertoomanydeepfriedwaffles 
PrioritynormalSeverityminorReproducibilityalways
Status newResolutionopen 
Product Version6.8 
Target VersionFixed in Version 
Summary0014569: CVE-2014-3956 does not appear to be patched
DescriptionThe current sendmail RPM for CentOS 6.9 (sendmail-8.14.4-9.el6_8.1.i686) does not appear to contain a relatively trivial patch provided for file descriptor leaks as part of Sendmail 8.14.9 and later. This vulnerability was reported as CVE-2014-3956.

The patch involves changing the argument order of sm_close_on_exec() within the sendmail/conf.c file so it matches the prototype provided in the sendmail/sendmail.h header file.

Since the patch is relatively compact and trivial, I am providing a slightly modified version inline here that worked with the current CentOS sendmail SPEC file.

====================
--- sendmail-8.14.4-prev/sendmail/conf.c 12 Jun 2013 21:27:22 -0000 1.35
+++ sendmail-8.14.4/sendmail/conf.c 5 Jun 2014 10:16:18 -0000
@@ -5267,8 +5267,8 @@ closefd_walk(lowest, fd)
 */
 
 void
-sm_close_on_exec(highest, lowest)
- int highest, lowest;
+sm_close_on_exec(lowest, highest)
+ int lowest, highest;
 {
 #if HASFDWALK
     (void) fdwalk(closefd_walk, &lowest);
====================

TagsNo tags attached.

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2018-03-09 23:30 toomanydeepfriedwaffles New Issue