head 1.8; access; symbols pkgsrc-2013Q2:1.8.0.26 pkgsrc-2013Q2-base:1.8 pkgsrc-2012Q4:1.8.0.24 pkgsrc-2012Q4-base:1.8 pkgsrc-2011Q4:1.8.0.22 pkgsrc-2011Q4-base:1.8 pkgsrc-2011Q2:1.8.0.20 pkgsrc-2011Q2-base:1.8 pkgsrc-2009Q4:1.8.0.18 pkgsrc-2009Q4-base:1.8 pkgsrc-2008Q4:1.8.0.16 pkgsrc-2008Q4-base:1.8 pkgsrc-2008Q3:1.8.0.14 pkgsrc-2008Q3-base:1.8 cube-native-xorg:1.8.0.12 cube-native-xorg-base:1.8 pkgsrc-2008Q2:1.8.0.10 pkgsrc-2008Q2-base:1.8 pkgsrc-2008Q1:1.8.0.8 pkgsrc-2008Q1-base:1.8 pkgsrc-2007Q4:1.8.0.6 pkgsrc-2007Q4-base:1.8 pkgsrc-2007Q3:1.8.0.4 pkgsrc-2007Q3-base:1.8 pkgsrc-2007Q2:1.8.0.2 pkgsrc-2007Q2-base:1.8 pkgsrc-2007Q1:1.7.0.6 pkgsrc-2007Q1-base:1.7 pkgsrc-2006Q4:1.7.0.4 pkgsrc-2006Q4-base:1.7 pkgsrc-2006Q3:1.7.0.2 pkgsrc-2006Q3-base:1.7 pkgsrc-2006Q2:1.5.0.2 pkgsrc-2006Q2-base:1.5 pkgsrc-2006Q1:1.4.0.2 pkgsrc-2006Q1-base:1.4 pkgsrc-2005Q4:1.3.0.4 pkgsrc-2005Q4-base:1.3 pkgsrc-2005Q3:1.3.0.2 pkgsrc-2005Q3-base:1.3 pkgsrc-2005Q2:1.2.0.4 pkgsrc-2005Q2-base:1.2 pkgsrc-2005Q1:1.2.0.2 pkgsrc-2005Q1-base:1.2 pkgsrc-2004Q4:1.1.1.1.0.4 pkgsrc-2004Q4-base:1.1.1.1 pkgsrc-2004Q3:1.1.1.1.0.2 pkgsrc-2004Q3-base:1.1.1.1 pkgsrc-base:1.1.1.1 TNF:1.1.1; locks; strict; comment @# @; 1.8 date 2007.04.17.10.25.34; author jnemeth; state dead; branches; next 1.7; 1.7 date 2006.09.11.17.18.09; author tv; state Exp; branches; next 1.6; 1.6 date 2006.09.05.20.06.06; author tv; state Exp; branches; next 1.5; 1.5 date 2006.06.14.18.57.34; author adrianp; state Exp; branches; next 1.4; 1.4 date 2006.03.22.21.19.06; author tv; state Exp; branches 1.4.2.1; next 1.3; 1.3 date 2005.09.08.22.32.39; author abs; state Exp; branches 1.3.4.1; next 1.2; 1.2 date 2005.02.24.09.59.29; author agc; state Exp; branches; next 1.1; 1.1 date 2004.08.30.19.56.45; author adrianp; state Exp; branches 1.1.1.1; next ; 1.4.2.1 date 2006.06.14.21.07.23; author salo; state Exp; branches; next ; 1.3.4.1 date 2006.03.24.16.11.16; author salo; state Exp; branches; next ; 1.1.1.1 date 2004.08.30.19.56.45; author adrianp; state Exp; branches; next ; desc @@ 1.8 log @Removal of sendmail 8.12.x branch from pkgsrc. We already have the 8.13.x and will soon have the 8.14.x branches in pkgsrc. @ text @$NetBSD: distinfo,v 1.7 2006/09/11 17:18:09 tv Exp $ SHA1 (8.12.11.p0) = aeef47bf434c13d91ba1c1e777cf81a2ba283290 RMD160 (8.12.11.p0) = 267afdf9abc4636d0750bddf3b7bd16fe9b2fd5b Size (8.12.11.p0) = 71804 bytes SHA1 (sendmail.8.12.11.tar.gz) = ce1ba0e50740c548f8555f1a905d8514e6637f95 RMD160 (sendmail.8.12.11.tar.gz) = a80ceccbe3425ea01ce6cb89f2226f83b3562b64 Size (sendmail.8.12.11.tar.gz) = 1899112 bytes SHA1 (patch-aa) = cf9a68f5e6d6fd6e13a806a7d1e6ebab18fc9c6f SHA1 (patch-ab) = a2abf6e78772e257e2a1973e7730159ff24a91aa SHA1 (patch-ac) = 96c19300b4188dbcbd202768eea912f675dadc27 SHA1 (patch-ad) = 7232cc7ceb46a2dbf631d61185e4c6ca4af18a13 SHA1 (patch-ae) = ae06caa125fe4d4fc85123dc0a5d0016cd099ebd SHA1 (patch-af) = d26481845328adad6d46fdf797785ec2ad003e28 SHA1 (patch-ag) = 4e84e709338eecc0dc14a6df42d8071fee1938a3 SHA1 (patch-ah) = b876e92147bce47fee5f77106c2a1b281fac743f SHA1 (patch-ai) = d17bc0a551fa5efd59f4822ca59049e166e59d86 SHA1 (patch-aj) = 6901b3efacf02ba5f71fbfb6056b1eced9d4c037 SHA1 (patch-ak) = 2668680ec507ce4b59acae1a985e3af105c51816 SHA1 (patch-al) = 95b7de0a68015256e372a7151b49c2a27e10f463 @ 1.7 log @That's odd, patch-al had a wrong checksum (possibly before I added the CVS Id to the file). Fix. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.6 2006/09/05 20:06:06 tv Exp $ @ 1.6 log @Add source patch to address issue originally found in Sendmail 8.13.7; may also affect 8.12.11: http://secunia.com/advisories/21637/ @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.5 2006/06/14 18:57:34 adrianp Exp $ d20 1 a20 1 SHA1 (patch-al) = a2fecb277272932a7deb72d15e5b6f6f295a3cd3 @ 1.5 log @Bump PKGREVISION. A malformed MIME structure with many parts can cause sendmail to crash while trying to send a mail due to a stack overflow, e.g., if the stack size is limited (ulimit -s). This happens because the recursion of the function mime8to7() was not restricted. The function is called for MIME 8 to 7 bit conversion and also to enforce MaxMimeHeaderLength. To work around this problem, recursive calls are limited to a depth of MAXMIMENESTING (20); message content after this limit is treated as opaque and is not checked further. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.4 2006/03/22 21:19:06 tv Exp $ d3 3 a8 3 SHA1 (8.12.11.p0) = aeef47bf434c13d91ba1c1e777cf81a2ba283290 RMD160 (8.12.11.p0) = 267afdf9abc4636d0750bddf3b7bd16fe9b2fd5b Size (8.12.11.p0) = 71804 bytes d20 1 @ 1.4 log @Update sendmail (with vendor patch) to address the current security issue: http://www.kb.cert.org/vuls/id/834865 Bump to nb2. This will change the internal version of sendmail to 8.12.11.20060308. > SECURITY: Replace unsafe use of setjmp(3)/longjmp(3) in the server > and client side of sendmail with timeouts in the libsm I/O > layer and fix problems in that code. Also fix handling of > a buffer in sm_syslog() which could have been used as an > attack vector to exploit the unsafe handling of > setjmp(3)/longjmp(3) in combination with signals. > Problem detected by Mark Dowd of ISS X-Force. > Handle theoretical integer overflows that could triggered if > the server accepted headers larger than the maximum > (signed) integer value. This is prevented in the default > configuration by restricting the size of a header, and on > most machines memory allocations would fail before reaching > those values. Problems found by Phil Brass of ISS. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.3 2005/09/08 22:32:39 abs Exp $ d16 4 @ 1.4.2.1 log @Pullup ticket 1701 - requested by adrianp security fix for sendmail812 Patch provided by the submitter. Module Name: pkgsrc Committed By: adrianp Date: Wed Jun 14 18:57:34 UTC 2006 Modified Files: pkgsrc/mail/sendmail812: Makefile distinfo Added Files: pkgsrc/mail/sendmail812/patches: patch-ah patch-ai patch-aj patch-ak Log Message: Bump PKGREVISION. A malformed MIME structure with many parts can cause sendmail to crash while trying to send a mail due to a stack overflow, e.g., if the stack size is limited (ulimit -s). This happens because the recursion of the function mime8to7() was not restricted. The function is called for MIME 8 to 7 bit conversion and also to enforce MaxMimeHeaderLength. To work around this problem, recursive calls are limited to a depth of MAXMIMENESTING (20); message content after this limit is treated as opaque and is not checked further. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.4 2006/03/22 21:19:06 tv Exp $ a15 4 SHA1 (patch-ah) = b876e92147bce47fee5f77106c2a1b281fac743f SHA1 (patch-ai) = d17bc0a551fa5efd59f4822ca59049e166e59d86 SHA1 (patch-aj) = 6901b3efacf02ba5f71fbfb6056b1eced9d4c037 SHA1 (patch-ak) = 12e2d44366920ee3c5f697d0e2f15fcd02d2d64f @ 1.3 log @Convert another rogue statvfs() __NetBSD_Version__ check to 299000900 @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.2 2005/02/24 09:59:29 agc Exp $ d6 3 @ 1.3.4.1 log @Pullup ticket 1254 - requested by Todd Vierling security fix for sendmail812 Revisions pulled up: - pkgsrc/mail/sendmail812/Makefile 1.8 - pkgsrc/mail/sendmail812/Makefile.common 1.10 - pkgsrc/mail/sendmail812/distinfo 1.4 Module Name: pkgsrc Committed By: tv Date: Wed Mar 22 21:19:06 UTC 2006 Modified Files: pkgsrc/mail/sendmail812: Makefile Makefile.common distinfo Log Message: Update sendmail (with vendor patch) to address the current security issue: http://www.kb.cert.org/vuls/id/834865 Bump to nb2. This will change the internal version of sendmail to 8.12.11.20060308. > SECURITY: Replace unsafe use of setjmp(3)/longjmp(3) in the server > and client side of sendmail with timeouts in the libsm I/O > layer and fix problems in that code. Also fix handling of > a buffer in sm_syslog() which could have been used as an > attack vector to exploit the unsafe handling of > setjmp(3)/longjmp(3) in combination with signals. > Problem detected by Mark Dowd of ISS X-Force. > Handle theoretical integer overflows that could triggered if > the server accepted headers larger than the maximum > (signed) integer value. This is prevented in the default > configuration by restricting the size of a header, and on > most machines memory allocations would fail before reaching > those values. Problems found by Phil Brass of ISS. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.4 2006/03/22 21:19:06 tv Exp $ a5 3 SHA1 (8.12.11.p0) = aeef47bf434c13d91ba1c1e777cf81a2ba283290 RMD160 (8.12.11.p0) = 267afdf9abc4636d0750bddf3b7bd16fe9b2fd5b Size (8.12.11.p0) = 71804 bytes @ 1.2 log @Add RMD160 digests. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.1.1.1 2004/08/30 19:56:45 adrianp Exp $ d12 1 a12 1 SHA1 (patch-ag) = b2e7c13de58ba90d149382e93095227c9ad39329 @ 1.1 log @Initial revision @ text @d1 1 a1 1 $NetBSD$ d4 1 @ 1.1.1.1 log @Rename of current sendmail package to sendmail812 to make way for new sendmail 8.13.x tree in pkgsrc. Changes to the original package include: - Added missing NetBSD CVS tags to some files under files - Path changes in Makefile and Makefile.common to reflect new location under mail/ of this package @ text @@