Date: Mon, 12 Jun 2006 22:14:31 GMT From: Milan Obuch <bsd@dino.sk> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/98878: [upgrade/vulnerability fix] mail/courier v. 0.53.2 Message-ID: <200606122214.k5CMEVCs079621@www.freebsd.org> Resent-Message-ID: <200606122220.k5CMKI1K055644@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 98878 >Category: ports >Synopsis: [upgrade/vulnerability fix] mail/courier v. 0.53.2 >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Mon Jun 12 22:20:17 GMT 2006 >Closed-Date: >Last-Modified: >Originator: Milan Obuch >Release: 6.1-release, 6.1-stable, 7.0-current >Organization: >Environment: >Description: There is new version of courier mail server, 0.53.2. It fixes vulnerability published as CVE-2006-2659. >How-To-Repeat: >Fix: mail# diff -u Makefile Makefile.new --- Makefile Thu May 11 00:36:47 2006 +++ Makefile.new Mon Jun 12 07:06:44 2006 @@ -6,8 +6,7 @@ # PORTNAME= courier -PORTVERSION= 0.52.2 -PORTREVISION= 1 +PORTVERSION= 0.53.2 CATEGORIES= mail ipv6 MASTER_SITES= ${MASTER_SITE_SOURCEFORGE} MASTER_SITE_SUBDIR= courier mail# diff -u distinfo distinfo.new --- distinfo Sat Feb 11 15:42:54 2006 +++ distinfo.new Mon Jun 12 07:06:51 2006 @@ -1,3 +1,3 @@ -MD5 (courier-0.52.2.tar.bz2) = 73cda41adc5425ade94e1f9005b2218b -SHA256 (courier-0.52.2.tar.bz2) = 7b717f22c9fe49e0042874d5615bdd7d4adc32659d0818eb7686de3004229beb -SIZE (courier-0.52.2.tar.bz2) = 6611624 +MD5 (courier-0.53.2.tar.bz2) = 9ac1f892dcd2505a85d4e60edb61120c +SHA256 (courier-0.53.2.tar.bz2) = 0b44e02652084ca4023646ca0cdd3d173dcbadf919e81aa012b42666b3acf726 +SIZE (courier-0.53.2.tar.bz2) = 6942557 >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200606122214.k5CMEVCs079621>