pkgsrc/mail/sympa/distinfo
bouyer c6ff149b09 Update sympa to 5.4.4. Bug fixes (including SQL injestion and privilege
escalation vulnerabilities) and updated translations:
    * Sympa was not fully compliant to the RFC 2616, leading for example
      to possible unwanted list deletion by administrators using prefetching
      tools. This was fixed by replacing all the threatening GET requests
      by POST requests;
    * Use of sprint() function for creating SQL queries lead to possible
      SQL injection through cookie manipulation;
    * The use of files in /tmp lead to vulnerabilities.
2008-12-20 19:02:12 +00:00

13 lines
713 B
Text

$NetBSD: distinfo,v 1.11 2008/12/20 19:02:12 bouyer Exp $
SHA1 (sympa-5.4.4.tar.gz) = 673d3a031ef2718ed234ce0814ad1d0083883919
RMD160 (sympa-5.4.4.tar.gz) = fb0b61ac3a56981ac7f44a1863504be937e4f4b5
Size (sympa-5.4.4.tar.gz) = 6523229 bytes
SHA1 (patch-aa) = 8db2096214d667d5bada0ffb97994be9e0891547
SHA1 (patch-ab) = 404ce642a733ef7922f58613c56f449f75641a9a
SHA1 (patch-ac) = 77802bab188da024c18810c07bf62064b28e3af1
SHA1 (patch-af) = ba9888ed1eed387f7758946aaeeaa5f408c2d760
SHA1 (patch-ag) = 97af077204f004945619d9a457e03430df1e2642
SHA1 (patch-ah) = 6a0b34ef49a7d68ac996251adee14ef29519f92d
SHA1 (patch-ai) = 4ce47ec2a664978cccbba7f075ee5315ee0bfa5d
SHA1 (patch-aj) = 639241f48effabc49d46a23f255a33cb51404d44