head 1.2; access; symbols pkgsrc-2013Q2:1.1.0.34 pkgsrc-2013Q2-base:1.1 pkgsrc-2013Q1:1.1.0.32 pkgsrc-2013Q1-base:1.1 pkgsrc-2012Q4:1.1.0.30 pkgsrc-2012Q4-base:1.1 pkgsrc-2012Q3:1.1.0.28 pkgsrc-2012Q3-base:1.1 pkgsrc-2012Q2:1.1.0.26 pkgsrc-2012Q2-base:1.1 pkgsrc-2012Q1:1.1.0.24 pkgsrc-2012Q1-base:1.1 pkgsrc-2011Q4:1.1.0.22 pkgsrc-2011Q4-base:1.1 pkgsrc-2011Q3:1.1.0.20 pkgsrc-2011Q3-base:1.1 pkgsrc-2011Q2:1.1.0.18 pkgsrc-2011Q2-base:1.1 pkgsrc-2011Q1:1.1.0.16 pkgsrc-2011Q1-base:1.1 pkgsrc-2010Q4:1.1.0.14 pkgsrc-2010Q4-base:1.1 pkgsrc-2010Q3:1.1.0.12 pkgsrc-2010Q3-base:1.1 pkgsrc-2010Q2:1.1.0.10 pkgsrc-2010Q2-base:1.1 pkgsrc-2010Q1:1.1.0.8 pkgsrc-2010Q1-base:1.1 pkgsrc-2009Q4:1.1.0.6 pkgsrc-2009Q4-base:1.1 pkgsrc-2009Q3:1.1.0.4 pkgsrc-2009Q3-base:1.1 pkgsrc-2009Q2:1.1.0.2; locks; strict; comment @# @; 1.2 date 2013.07.06.11.09.26; author tron; state dead; branches; next 1.1; commitid 6qHy4GCzM3BPRoWw; 1.1 date 2009.09.08.10.36.27; author tron; state Exp; branches 1.1.2.1; next ; 1.1.2.1 date 2009.09.08.10.36.27; author spz; state dead; branches; next 1.1.2.2; 1.1.2.2 date 2009.09.13.11.46.01; author spz; state Exp; branches; next ; desc @@ 1.2 log @Update "libspf2" package to version 1.2.10. A list of changes since version 1.2.9 (which is old) is not available. Two improvements that I noticed are: 1.) A remote DoS vulnerability (for which "pkgsrc" had a patch) has been fixed. 2.) The SPF records for "gmail.com" are now accepted again. @ text @$NetBSD: patch-aa,v 1.1 2009/09/08 10:36:27 tron Exp $ Fix an abort() caused by miscalculating the size of an internal buffer. This can crash applications using "libspf2" (e.g. "milter-greylist") in an e-mail gets delivered via SMTP over IPv6 depending on the remote machine's IPv6 address. --- src/libspf2/spf_expand.c.orig 2008-11-03 21:29:00.000000000 +0000 +++ src/libspf2/spf_expand.c 2009-09-08 11:27:52.000000000 +0100 @@@@ -245,7 +245,7 @@@@ case PARM_CLIENT_IP: /* SMTP client IP */ #ifdef COMPUTE if (compute_length) { - len = sizeof(ip6_buf); + len = sizeof(ip6_rbuf); if (d->dv.url_encode) len *= 3; buflen += len; @ 1.1 log @Fix an abort() caused by miscalculating the size of an internal buffer. This can crash applications using "libspf2" (e.g. "milter-greylist") in an e-mail gets delivered via SMTP over IPv6 depending on the remote machine's IPv6 address. @ text @d1 1 a1 1 $NetBSD$ @ 1.1.2.1 log @file patch-aa was added on branch pkgsrc-2009Q2 on 2009-09-13 11:46:01 +0000 @ text @d1 18 @ 1.1.2.2 log @Pullup ticket 2883 - requested by tron security fix Revisions pulled up: - pkgsrc/mail/libspf2/Makefile 1.7 - pkgsrc/mail/libspf2/distinfo 1.4 Files added: pkgsrc/mail/libspf2/patches/patch-aa 1.1 Module Name: pkgsrc Committed By: tron Date: Tue Sep 8 10:36:27 UTC 2009 Modified Files: pkgsrc/mail/libspf2: Makefile distinfo Added Files: pkgsrc/mail/libspf2/patches: patch-aa Log Message: Fix an abort() caused by miscalculating the size of an internal buffer. This can crash applications using "libspf2" (e.g. "milter-greylist") in an e-mail gets delivered via SMTP over IPv6 depending on the remote machine's IPv6 address. To generate a diff of this commit: cvs rdiff -u -r1.6 -r1.7 pkgsrc/mail/libspf2/Makefile cvs rdiff -u -r1.3 -r1.4 pkgsrc/mail/libspf2/distinfo cvs rdiff -u -r0 -r1.1 pkgsrc/mail/libspf2/patches/patch-aa @ text @a0 18 $NetBSD: patch-aa,v 1.1 2009/09/08 10:36:27 tron Exp $ Fix an abort() caused by miscalculating the size of an internal buffer. This can crash applications using "libspf2" (e.g. "milter-greylist") in an e-mail gets delivered via SMTP over IPv6 depending on the remote machine's IPv6 address. --- src/libspf2/spf_expand.c.orig 2008-11-03 21:29:00.000000000 +0000 +++ src/libspf2/spf_expand.c 2009-09-08 11:27:52.000000000 +0100 @@@@ -245,7 +245,7 @@@@ case PARM_CLIENT_IP: /* SMTP client IP */ #ifdef COMPUTE if (compute_length) { - len = sizeof(ip6_buf); + len = sizeof(ip6_rbuf); if (d->dv.url_encode) len *= 3; buflen += len; @