There's a security advisory just been released for qmail and qmail-verify. Although the main qmail exploit looks non-trivial, it's still of concern. The qmail-verify exploit doesn't apply to indimail, indimail-mta.
The good news is that the main exploit is mitigated wich changes to gen_alloc.h, gen_allocdefs.h, alloc.c in libqmail. They have been modified to fix the vulnerability.
Also the qmail-local exploit exploit is mitigated by the databytes limit feature in spawn-filter, which limits the size of mail delivery in qmail-local and qmail-remote. However, qmail-local has been modified to fix the possible vulnerability.
Here is the link to the advisory
gen_alloc.h, gen_allocdefs.h, alloc.h, constmap.c, env.c, stralloc_catb.c, stralloc_opyb.c, stralloc_arts.c, substdo.c, substdio.c, stralloc_pend.c,
ofmipd.c, qmail-local.c, qmail-send.c, sendmail.c, qsmhook.c, quote.c, commands.c, qmail.c
- indimail - Recompilation for change in the header files gen_alloc.h, gen_allocdefs.h