Security update for Sendmail (package sendmail-devel)
Knowledgebase
(Last modified: 01APR2003)
solutions Security update for Sendmail (package sendmail-devel) SuSE Linux Maintenance Web (e8426b8e8a7ba6510b9b8e35deec594a)
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM S/390 and IBM zSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Openexchange Server 4
SuSE Linux Enterprise Server 8 for IPF
Package: sendmail-devel
Release: 20030401
Obsoletes: cea49936f292ba8297049a5eb8da1eee
sendmail-devel
package installed. Please note that this does not fix the vulneralibilty by the normal sendmail
dÆmon. Please refer to the SuSE Maintenance Web article "Security update for Sendmail (package sendmail)" (http://sdb.suse.de/en/psdb/html/63ef3602dad4c0eeb0c19cf83808746b.html) for an update of the sendmail
dÆmon.sendmail
has been found. The bug can be abused by a local or remote attacker to gain elevated privileges on a system running sendmail.Please note that this flaw (as announced by CERT with the id CA-2003-12) is different from the one that was reason for an update in early March 2003 (CERT announcement CA-2003-07, SuSE Maintenance Web article "Security update for sendmail (package sendmail)" (http://sdb.suse.de/en/psdb/html/de453c8319b6505d448075350f15aef5.html)).
rpm -Fvh sendmail-devel.rpm
The update is for the
sendmail-devel
package only. The sendmail-devel
package contains three static libraries that may be used by programs compiled by the administrator. If you have programs that make use of these libraries, you should make sure that you recompile these programs after this patch has been installed.For the security update of the
sendmail
dÆmon please refer to the SuSE Maintenance Web article "Security update for sendmail (package sendmail)" (http://sdb.suse.de/en/psdb/html/de453c8319b6505d448075350f15aef5.html).Download Source Packages
Download the source code of the patches for maintained products.
Disclaimer
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.