From 43d38ada21ea773ebfa5e9e6541b53e85250309e Mon Sep 17 00:00:00 2001 From: "Todd C. Miller" Date: Mon, 1 Oct 2001 17:18:31 +0000 Subject: Update to sendmail 8.12.1. A potential security problem has been uncovered in 8.12.0 which might be exploited locally by malicious users to gain access to the client mail queue. However, as long as the MTA accepts local connections, the possible consequences of this potential local exploit are small. Notice: some operating systems don't provide a way to completely drop privileges from a set-group-ID program. In that case sendmail refuses to run if unsafe options are given. --- gnu/usr.sbin/sendmail/libsm/ldap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'gnu/usr.sbin/sendmail/libsm/ldap.c') diff --git a/gnu/usr.sbin/sendmail/libsm/ldap.c b/gnu/usr.sbin/sendmail/libsm/ldap.c index 2c92bce45ee..2f7af53c3cd 100644 --- a/gnu/usr.sbin/sendmail/libsm/ldap.c +++ b/gnu/usr.sbin/sendmail/libsm/ldap.c @@ -8,7 +8,7 @@ */ #include -SM_RCSID("@(#)$Sendmail: ldap.c,v 1.8 2001/06/06 00:09:47 gshapiro Exp $") +SM_RCSID("@(#)$Sendmail: ldap.c,v 1.10 2001/09/11 04:04:48 gshapiro Exp $") #if LDAPMAP # include -- cgit v1.2.3