Skip to content

Commit

Permalink
Fix an abort() caused by miscalculating the size of an internal buffer.
Browse files Browse the repository at this point in the history
This can crash applications using "libspf2" (e.g. "milter-greylist")
in an e-mail gets delivered via SMTP over IPv6 depending on the
remote machine's IPv6 address.
  • Loading branch information
tron committed Sep 8, 2009
1 parent d145c16 commit a314745
Show file tree
Hide file tree
Showing 3 changed files with 22 additions and 2 deletions.
3 changes: 2 additions & 1 deletion mail/libspf2/Makefile
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
# $NetBSD: Makefile,v 1.6 2009/07/17 18:00:18 adrianp Exp $
# $NetBSD: Makefile,v 1.7 2009/09/08 10:36:27 tron Exp $

DISTNAME= libspf2-1.2.9
PKGREVISION= 1
CATEGORIES= mail
MASTER_SITES= http://www.libspf2.org/spf/

Expand Down
3 changes: 2 additions & 1 deletion mail/libspf2/distinfo
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
$NetBSD: distinfo,v 1.3 2009/01/10 23:34:13 adrianp Exp $
$NetBSD: distinfo,v 1.4 2009/09/08 10:36:27 tron Exp $

SHA1 (libspf2-1.2.9.tar.gz) = 15dfe3b9172180654f4de4dd85f3f01e3bc11503
RMD160 (libspf2-1.2.9.tar.gz) = d0754d47e297a00038e4185e17704a24d38a4888
Size (libspf2-1.2.9.tar.gz) = 518001 bytes
SHA1 (patch-aa) = 81f60333222b510cb511b80aedbb679d2212ab0d
18 changes: 18 additions & 0 deletions mail/libspf2/patches/patch-aa
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
$NetBSD: patch-aa,v 1.1 2009/09/08 10:36:27 tron Exp $

Fix an abort() caused by miscalculating the size of an internal buffer.
This can crash applications using "libspf2" (e.g. "milter-greylist")
in an e-mail gets delivered via SMTP over IPv6 depending on the
remote machine's IPv6 address.

--- src/libspf2/spf_expand.c.orig 2008-11-03 21:29:00.000000000 +0000
+++ src/libspf2/spf_expand.c 2009-09-08 11:27:52.000000000 +0100
@@ -245,7 +245,7 @@
case PARM_CLIENT_IP: /* SMTP client IP */
#ifdef COMPUTE
if (compute_length) {
- len = sizeof(ip6_buf);
+ len = sizeof(ip6_rbuf);
if (d->dv.url_encode)
len *= 3;
buflen += len;

0 comments on commit a314745

Please sign in to comment.