Enterprise Linux Security Advisory ELSA-2007-0252 https://rhn.redhat.com/errata/RHSA-2007-0252.html The following updated rpms for Enterprise Linux 4 have been uploaded to the Unbreakable Linux Network: i386: sendmail-8.13.1-3.2.el4.i386.rpm sendmail-cf-8.13.1-3.2.el4.i386.rpm sendmail-devel-8.13.1-3.2.el4.i386.rpm sendmail-doc-8.13.1-3.2.el4.i386.rpm x86_64: sendmail-8.13.1-3.2.el4.x86_64.rpm sendmail-cf-8.13.1-3.2.el4.x86_64.rpm sendmail-devel-8.13.1-3.2.el4.x86_64.rpm sendmail-doc-8.13.1-3.2.el4.x86_64.rpm SRPMS: http://oss.oracle.com/el4/SRPMS-updates/sendmail-8.13.1-3.2.el4.src.rpm Description of changes: [8.13.1-3.2.el4] - fixed infinite loop within tls read by enabling _FFR_DEAL_WITH_ERROR_SSL Resolves: rhbz##121850 - fixed incorrect path to selinuxenabled in initscript Resolves: rhbz#152282 - removed rpm build artifacts from sendmail-cf package Resolves: rhbz#152955 - fixed missing socketmap support Resolves: rhbz#156191 - fixed patch for aliases file Resolves: rhbz#166744 - do not accept localhost.localdomain as valid address from smtp Resolves: rhbz#171838 - allow CipherList config option Resolves: rhbz#172352 - fixed failure of shutting down sm-client Resolves: rhbz#200920 - allow to specify persistent queue runners Resolves: rhbz#200921 - fixed missing dnl for SMART_HOST define Resolves: rhbz#200923 [8.13.1-3.1.el4] - fixed connections stay in CLOSE_WAIT Resolves: rhbz#220304
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center