From owner-FreeBSD-users-jp@jp.freebsd.org  Tue Nov 11 17:02:59 1997
Received: by jaz.jp.freebsd.org (8.8.8+2.7Wbeta7/8.7.3) id RAA16954
	Tue, 11 Nov 1997 17:02:59 +0900 (JST)
Received: by jaz.jp.freebsd.org (8.8.7+2.7Wbeta7/8.7.3) with ESMTP id RAA16949
	for <freebsd-users-jp@jp.freebsd.org>; Tue, 11 Nov 1997 17:02:57 +0900 (JST)
Received: from nocs3.noc.titech.ac.jp by nocs1.noc.titech.ac.jp (8.8.8/TM2.1-bn3.3)
	id RAA27575; Tue, 11 Nov 1997 17:02:49 +0900 (JST)
Received: from noc.titech.ac.jp by nocs3.noc.titech.ac.jp (8.7+2.6Wbeta3/noc-sub1.0)
	id RAA00989; Tue, 11 Nov 1997 17:02:48 +0900 (JST)
Message-Id: <199711110802.RAA00989@nocs3.noc.titech.ac.jp>
To: FreeBSD-users-jp@jp.freebsd.org
X-Mailer: Mew version 1.54 on Emacs 19.28.1, Mule 2.3
Mime-Version: 1.0
Date: Tue, 11 Nov 1997 17:02:47 +0900
From: IIJIMA Akihiro <aki@noc.titech.ac.jp>
Reply-To: FreeBSD-users-jp@jp.freebsd.org
Precedence: bulk
X-Distribute: distribute [version 2.1 (Alpha) patchlevel=20]
X-Sequence: FreeBSD-users-jp 20534
Subject: [FreeBSD-users-jp 20534] Re: majordomo-1.94.4
Errors-To: owner-FreeBSD-users-jp@jp.freebsd.org
Sender: owner-FreeBSD-users-jp@jp.freebsd.org

Content-Transfer-Encoding: 7bit

$B%=!<%9$rFI$b$&!#%I%-%e%a%s%H$rFI$b$&!#(B

> # newaliases
> hash map "Alias1": unsafe map file /usr/local/majordomo/aliases.majordomo:
> Permission denied

unsafe $B$C$F8@$C$F$s$@$+$i(B
> $B%Q!<%_%C%7%g%s$,$*$+$7$$$h$&$J;v$,8@$o$l$^$7$?!#(B
$B$G$7$g!#(B

file$B$N(B owner$B$H$+(B $B=q$-9~$_2DG=$+(B $B$H$+$,4X78$7$F$=$&$G$9$M!#(B

man newaliases$B$G$O=P$FMh$^$;$s$,!"(B
sendmai.8.8.8/src $B$G(B grep unsafe *$B!#(Bc$B$9$k$H(B map.c$B$NCf$K(B

	        if (FatalWritableDirs)
                sff |= SFF_SAFEDIRPATH;
        if ((i = safefile(buf, RunAsUid, RunAsGid, RunAsUserName,
                          sff, smode, &st)) != 0)
        {
                /* cannot open this map */
                if (tTd(38, 2))
                        printf("\tunsafe map file: %s\n", errstring(i));
                errno = i;

$B$H$"$j$^$9$N$G(B $BC/$G$b=q$-9~$_2D(B $B$H$+$@$H5Q2<$J$N$G$7$g$&!#(B

RELEASE_NOTES $B$r(B $B$_$k$H(B

8.8.4/8.8.4     96/12/02
        SECURITY: under some circumstances, an attacker could get additional
                permissions by hard linking to files that were group
                writable by the attacker.  The solution is to disallow any
                files that have hard links -- this will affect .forward,
                :include:, and output files.  Problem noted by Terry
                Kyriacopoulos of Interlog Internet Services.  As a
                workaround, set UnsafeGroupWrites -- always a good idea.

8.8.0/8.8.0     96/09/26
        Add new UnsafeGroupWrites option; if set, .forward and :include:
                files that are group writable are considered "unsafe" -- that
                is, programs and files referenced from such files are not
                valid recipients.

$B$8$c$!(B $B6qBNE*$K(B $B$I$&$$$&%U%!%$%k%b!<%I$J$i$$$$$s$8$c$$(B $B$H$$$&$N$O(B
$B8+$D$+$j$^$;$s$G$7$?!#(B
--
$BEl5~9)6HBg3X(B $BAm9g>pJs=hM}%;%s%?!<(B $B%M%C%H%o!<%/%7%9%F%`1?MQ3](B
	$BHSEg(B $B><Gn(B (Akihiro Iijima) aki@noc.titech.ac.jp
