diff options
author | salo <salo> | 2006-06-14 21:07:23 +0000 |
---|---|---|
committer | salo <salo> | 2006-06-14 21:07:23 +0000 |
commit | 0656e254edcf54ebabb096b38c6413b0c46d74d5 (patch) | |
tree | 249b93bb565ac3f6d5261c5f2c20f5861c2c6bcd /mail/sendmail812/patches/patch-aj | |
parent | ca20779322dc43066e7e6fe1371d63ea8ad23929 (diff) | |
download | pkgsrc-0656e254edcf54ebabb096b38c6413b0c46d74d5.tar.gz |
Pullup ticket 1701 - requested by adrianp
security fix for sendmail812
Patch provided by the submitter.
Module Name: pkgsrc
Committed By: adrianp
Date: Wed Jun 14 18:57:34 UTC 2006
Modified Files:
pkgsrc/mail/sendmail812: Makefile distinfo
Added Files:
pkgsrc/mail/sendmail812/patches: patch-ah patch-ai patch-aj patch-ak
Log Message:
Bump PKGREVISION.
A malformed MIME structure with many parts can cause sendmail to
crash while trying to send a mail due to a stack overflow,
e.g., if the stack size is limited (ulimit -s). This
happens because the recursion of the function mime8to7()
was not restricted. The function is called for MIME 8 to
7 bit conversion and also to enforce MaxMimeHeaderLength.
To work around this problem, recursive calls are limited to
a depth of MAXMIMENESTING (20); message content after this
limit is treated as opaque and is not checked further.
Diffstat (limited to 'mail/sendmail812/patches/patch-aj')
-rw-r--r-- | mail/sendmail812/patches/patch-aj | 21 |
1 files changed, 21 insertions, 0 deletions
diff --git a/mail/sendmail812/patches/patch-aj b/mail/sendmail812/patches/patch-aj new file mode 100644 index 00000000000..5e4d82e2987 --- /dev/null +++ b/mail/sendmail812/patches/patch-aj @@ -0,0 +1,21 @@ +$NetBSD: patch-aj,v 1.1.2.2 2006/06/14 21:07:23 salo Exp $ + +--- sendmail/sendmail.h.orig 2006-06-13 21:35:58.000000000 +0100 ++++ sendmail/sendmail.h +@@ -942,6 +942,7 @@ struct envelope + #define EF_TOOBIG 0x02000000L /* message is too big */ + #define EF_SPLIT 0x04000000L /* envelope has been split */ + #define EF_UNSAFE 0x08000000L /* unsafe: read from untrusted source */ ++#define EF_TOODEEP 0x10000000L /* message is nested too deep */ + + #define DLVR_NOTIFY 0x01 + #define DLVR_RETURN 0x02 +@@ -1592,7 +1593,7 @@ EXTERN unsigned long PrivacyFlags; /* pr + + /* functions */ + extern bool mime7to8 __P((MCI *, HDR *, ENVELOPE *)); +-extern int mime8to7 __P((MCI *, HDR *, ENVELOPE *, char **, int)); ++extern int mime8to7 __P((MCI *, HDR *, ENVELOPE *, char **, int, int)); + + /* + ** Flags passed to returntosender. |