KNOWNBUGS (66494) | KNOWNBUGS (80785) |
---|---|
1 2 3 K N O W N B U G S I N S E N D M A I L 4 5 6The following are bugs or deficiencies in sendmail that I am aware of 7but which have not been fixed in the current release. You probably 8want to get the most up to date version of this from ftp.sendmail.org --- 21 unchanged lines hidden (view full) --- 30* Null bytes are not handled properly in headers. 31 32 Sendmail should handle full binary data. As it stands, it handles 33 all values in the body, but only 0x01-0x80 and 0xA0-0xFF in 34 the header. Notably missing is 0x00, which would require a major 35 restructuring of the code -- for example, almost no C library support 36 could be used to handle strings. 37 | 1 2 3 K N O W N B U G S I N S E N D M A I L 4 5 6The following are bugs or deficiencies in sendmail that I am aware of 7but which have not been fixed in the current release. You probably 8want to get the most up to date version of this from ftp.sendmail.org --- 21 unchanged lines hidden (view full) --- 30* Null bytes are not handled properly in headers. 31 32 Sendmail should handle full binary data. As it stands, it handles 33 all values in the body, but only 0x01-0x80 and 0xA0-0xFF in 34 the header. Notably missing is 0x00, which would require a major 35 restructuring of the code -- for example, almost no C library support 36 could be used to handle strings. 37 |
38* Header checks are not called if header value is too long. 39 40 If the value of a header is longer than 1250 (MAXNAME + MAXATOM - 6) 41 characters or it contains a single word longer than 256 (MAXNAME) 42 characters then no header check is done even if one is configured for 43 the header. 44 |
|
38* Duplicate error messages. 39 40 Sometimes identical, duplicate error messages can be generated. As 41 near as I can tell, this is rare and relatively innocuous. 42 43* $c (hop count) macro improperly set. 44 45 The $c macro is supposed to contain the current hop count, for use --- 142 unchanged lines hidden (view full) --- 188 189 Since SIGALRM does not interrupt an RPC call for hard mounted 190 NFS file systems, it is impossible to implement a timeout on a file 191 open operation. Therefore, while the NFS server is not responding, 192 attempts to open a file on that server will hang. Systems with 193 local mail delivery and NFS hard mounted home directories should be 194 avoided, as attempts to open the forward files could hang. 195 | 45* Duplicate error messages. 46 47 Sometimes identical, duplicate error messages can be generated. As 48 near as I can tell, this is rare and relatively innocuous. 49 50* $c (hop count) macro improperly set. 51 52 The $c macro is supposed to contain the current hop count, for use --- 142 unchanged lines hidden (view full) --- 195 196 Since SIGALRM does not interrupt an RPC call for hard mounted 197 NFS file systems, it is impossible to implement a timeout on a file 198 open operation. Therefore, while the NFS server is not responding, 199 attempts to open a file on that server will hang. Systems with 200 local mail delivery and NFS hard mounted home directories should be 201 avoided, as attempts to open the forward files could hang. 202 |
196* Race condition for delivery to setuid files | 203* Race condition for delivery to set-user-id files |
197 198 Sendmail will deliver to a fail if the file is owned by the DefaultUser | 204 205 Sendmail will deliver to a fail if the file is owned by the DefaultUser |
199 or has the setuid bit set. Unfortunately, some systems clear that bit | 206 or has the set-user-id bit set. Unfortunately, some systems clear that bit |
200 when a file is modified. Sendmail compensates by resetting the file mode 201 back to it's original settings. Unfortunately, there's still a 202 permission failure race as sendmail checks the permissions before locking 203 the file. This is unavoidable as sendmail must verify the file is safe 204 to open before opening it. A file can not be locked until it is open. 205 206* Potential denial of service attack with AutoRebuildAliases 207 208 There is a potential for a denial of service attack if the 209 AutoRebuildAliases option is set as a user can kill the sendmail process 210 while it is rebuilding the aliases file leaving it in an inconsistent 211 state. This option and it's use is deprecated and will be removed from a 212 future version of sendmail. 213 | 207 when a file is modified. Sendmail compensates by resetting the file mode 208 back to it's original settings. Unfortunately, there's still a 209 permission failure race as sendmail checks the permissions before locking 210 the file. This is unavoidable as sendmail must verify the file is safe 211 to open before opening it. A file can not be locked until it is open. 212 213* Potential denial of service attack with AutoRebuildAliases 214 215 There is a potential for a denial of service attack if the 216 AutoRebuildAliases option is set as a user can kill the sendmail process 217 while it is rebuilding the aliases file leaving it in an inconsistent 218 state. This option and it's use is deprecated and will be removed from a 219 future version of sendmail. 220 |
214$Revision: 8.43.16.1 $, Last updated $Date: 2000/09/28 00:45:37 $ | 221$Revision: 8.43.16.2 $, Last updated $Date: 2001/07/31 22:42:46 $ |