pkgsrc/mail/sendmail812/distinfo
tv 0ce2b03348 Update sendmail (with vendor patch) to address the current security issue:
http://www.kb.cert.org/vuls/id/834865

Bump to nb2.
This will change the internal version of sendmail to 8.12.11.20060308.

>       SECURITY: Replace unsafe use of setjmp(3)/longjmp(3) in the server
>               and client side of sendmail with timeouts in the libsm I/O
>               layer and fix problems in that code.  Also fix handling of
>               a buffer in sm_syslog() which could have been used as an
>               attack vector to exploit the unsafe handling of
>               setjmp(3)/longjmp(3) in combination with signals.
>               Problem detected by Mark Dowd of ISS X-Force.
>       Handle theoretical integer overflows that could triggered if
>               the server accepted headers larger than the maximum
>               (signed) integer value.  This is prevented in the default
>               configuration by restricting the size of a header, and on
>               most machines memory allocations would fail before reaching
>               those values.  Problems found by Phil Brass of ISS.
2006-03-22 21:19:06 +00:00

15 lines
820 B
Text

$NetBSD: distinfo,v 1.4 2006/03/22 21:19:06 tv Exp $
SHA1 (sendmail.8.12.11.tar.gz) = ce1ba0e50740c548f8555f1a905d8514e6637f95
RMD160 (sendmail.8.12.11.tar.gz) = a80ceccbe3425ea01ce6cb89f2226f83b3562b64
Size (sendmail.8.12.11.tar.gz) = 1899112 bytes
SHA1 (8.12.11.p0) = aeef47bf434c13d91ba1c1e777cf81a2ba283290
RMD160 (8.12.11.p0) = 267afdf9abc4636d0750bddf3b7bd16fe9b2fd5b
Size (8.12.11.p0) = 71804 bytes
SHA1 (patch-aa) = cf9a68f5e6d6fd6e13a806a7d1e6ebab18fc9c6f
SHA1 (patch-ab) = a2abf6e78772e257e2a1973e7730159ff24a91aa
SHA1 (patch-ac) = 96c19300b4188dbcbd202768eea912f675dadc27
SHA1 (patch-ad) = 7232cc7ceb46a2dbf631d61185e4c6ca4af18a13
SHA1 (patch-ae) = ae06caa125fe4d4fc85123dc0a5d0016cd099ebd
SHA1 (patch-af) = d26481845328adad6d46fdf797785ec2ad003e28
SHA1 (patch-ag) = 4e84e709338eecc0dc14a6df42d8071fee1938a3