aboutsummaryrefslogtreecommitdiffstats
path: root/mail/sendmail
diff options
context:
space:
mode:
authordinoex <dinoex@FreeBSD.org>2001-08-21 11:00:02 +0800
committerdinoex <dinoex@FreeBSD.org>2001-08-21 11:00:02 +0800
commite3909470a4540cb08e5c6f93ac3af6692aebc48c (patch)
treee018822e30c5976aad1701754a656ac82efdb709 /mail/sendmail
parent4ef036fc4dd73abb982383e0db32d7b55e3f4d65 (diff)
downloadfreebsd-ports-gnome-e3909470a4540cb08e5c6f93ac3af6692aebc48c.tar.gz
freebsd-ports-gnome-e3909470a4540cb08e5c6f93ac3af6692aebc48c.tar.zst
freebsd-ports-gnome-e3909470a4540cb08e5c6f93ac3af6692aebc48c.zip
Urgent Update to 8.11.6:
Sendmail, Inc., and the Sendmail Consortium announce the availability of sendmail 8.11.6 and 8.12.0.Beta19. These new versions fix a security problem reported by SecurityFocus regarding command line processing. This vulnerability is present in sendmail open source versions between 8.10.0 and 8.11.5 as well as all 8.12.0.Beta versions. Therefore, sendmail 8.12.0.Beta users should upgrade to 8.12.0.Beta19. The problem was not present in 8.10 or earlier versions. However, as always, we recommend using the latest version. Note that this problem is not remotely exploitable.
Diffstat (limited to 'mail/sendmail')
-rw-r--r--mail/sendmail/Makefile2
-rw-r--r--mail/sendmail/distinfo2
2 files changed, 2 insertions, 2 deletions
diff --git a/mail/sendmail/Makefile b/mail/sendmail/Makefile
index 83de08cc8840..dd00a414b7cc 100644
--- a/mail/sendmail/Makefile
+++ b/mail/sendmail/Makefile
@@ -6,7 +6,7 @@
#
PORTNAME= sendmail
-PORTVERSION= 8.11.5
+PORTVERSION= 8.11.6
CATEGORIES= mail ipv6
MASTER_SITES= ftp://ftp.sendmail.org/pub/sendmail/ \
${MASTER_SITE_RINGSERVER:S,%SUBDIR%,net/mail/sendmail/&,}
diff --git a/mail/sendmail/distinfo b/mail/sendmail/distinfo
index 6bea3191c52b..4cd8af6d7915 100644
--- a/mail/sendmail/distinfo
+++ b/mail/sendmail/distinfo
@@ -1 +1 @@
-MD5 (sendmail.8.11.5.tar.gz) = 7b8c5771e5e80799c94292ff6429b7ce
+MD5 (sendmail.8.11.6.tar.gz) = a57e7681d810d9d6400cbe6bbcf06aa0