From owner-cvs-all Mon Aug 20 20: 0:12 2001 Delivered-To: cvs-all@freebsd.org Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id 4273337B406; Mon, 20 Aug 2001 20:00:04 -0700 (PDT) (envelope-from dinoex@FreeBSD.org) Received: (from dinoex@localhost) by freefall.freebsd.org (8.11.4/8.11.4) id f7L304W06909; Mon, 20 Aug 2001 20:00:04 -0700 (PDT) (envelope-from dinoex) Message-Id: <200108210300.f7L304W06909@freefall.freebsd.org> From: Dirk Meyer Date: Mon, 20 Aug 2001 20:00:03 -0700 (PDT) To: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/mail/sendmail Makefile distinfo X-FreeBSD-CVS-Branch: HEAD Sender: owner-cvs-all@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG dinoex 2001/08/20 20:00:03 PDT Modified files: mail/sendmail Makefile distinfo Log: Urgent Update to 8.11.6: Sendmail, Inc., and the Sendmail Consortium announce the availability of sendmail 8.11.6 and 8.12.0.Beta19. These new versions fix a security problem reported by SecurityFocus regarding command line processing. This vulnerability is present in sendmail open source versions between 8.10.0 and 8.11.5 as well as all 8.12.0.Beta versions. Therefore, sendmail 8.12.0.Beta users should upgrade to 8.12.0.Beta19. The problem was not present in 8.10 or earlier versions. However, as always, we recommend using the latest version. Note that this problem is not remotely exploitable. Revision Changes Path 1.23 +2 -2 ports/mail/sendmail/Makefile 1.7 +1 -1 ports/mail/sendmail/distinfo To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message