aboutsummaryrefslogtreecommitdiffstats
path: root/net-im/aim
diff options
context:
space:
mode:
authordinoex <dinoex@FreeBSD.org>2001-08-21 11:00:02 +0800
committerdinoex <dinoex@FreeBSD.org>2001-08-21 11:00:02 +0800
commite3909470a4540cb08e5c6f93ac3af6692aebc48c (patch)
treee018822e30c5976aad1701754a656ac82efdb709 /net-im/aim
parent4ef036fc4dd73abb982383e0db32d7b55e3f4d65 (diff)
downloadfreebsd-ports-gnome-e3909470a4540cb08e5c6f93ac3af6692aebc48c.tar.gz
freebsd-ports-gnome-e3909470a4540cb08e5c6f93ac3af6692aebc48c.tar.zst
freebsd-ports-gnome-e3909470a4540cb08e5c6f93ac3af6692aebc48c.zip
Urgent Update to 8.11.6:
Sendmail, Inc., and the Sendmail Consortium announce the availability of sendmail 8.11.6 and 8.12.0.Beta19. These new versions fix a security problem reported by SecurityFocus regarding command line processing. This vulnerability is present in sendmail open source versions between 8.10.0 and 8.11.5 as well as all 8.12.0.Beta versions. Therefore, sendmail 8.12.0.Beta users should upgrade to 8.12.0.Beta19. The problem was not present in 8.10 or earlier versions. However, as always, we recommend using the latest version. Note that this problem is not remotely exploitable.
Diffstat (limited to 'net-im/aim')
0 files changed, 0 insertions, 0 deletions