Log Message: squirrelmail: patch remote code execution (CVE-2017-7692) separately escape tainted input before feeding it into popen. https://www.wearesegment.com/research/Squirrelmail-Remote-Code-Execution.html patch from Filipo Cavallarin@wearesegment, who also found the vulnerability. bump PKGREVISION
Revision | Action | file |
1.132 | modify | pkgsrc/mail/squirrelmail/Makefile |
1.68 | modify | pkgsrc/mail/squirrelmail/distinfo |
1.1 | add | pkgsrc/mail/squirrelmail/patches/patch-class_deliver_Deliver__SendMail.class.php |