head	1.2;
access;
symbols
	RELEASE_4_2_0:1.1;
locks; strict;
comment	@# @;


1.2
date	2000.11.17.19.06.54;	author keith;	state dead;
branches;
next	1.1;

1.1
date	2000.10.30.01.35.21;	author kris;	state Exp;
branches;
next	;


desc
@@


1.2
log
@Upgrade from 4.21 to 4.30.

Especially thanks to the maintainer, Tai-hwa Liang (avatar), for
ending those long lasting evil +400k files/patch-*. :-)

According to kkenn, pine4's security will exist until it's totally
rewritten, so I'll leave pkg-install untouched, which shows the
security warning.
PR:		ports/22436
@
text
@*** pine/newmail.c.orig	Mon Sep 25 15:07:01 2000
--- pine/newmail.c	Tue Sep 26 15:34:24 2000
***************
*** 342,348 ****
  					   e->from->personal, NULL),
  		   ps_global->ttyo->screen_cols);
  	else
! 	  sprintf(from + ((number > 1L) ? 18 : 6), "%s%s%s", 
  		  e->from->mailbox,
  		  e->from->host ? "@@" : "",
  		  e->from->host ? e->from->host : "");
--- 342,349 ----
  					   e->from->personal, NULL),
  		   ps_global->ttyo->screen_cols);
  	else
! 	  snprintf(from + ((number > 1L) ? 18 : 6), sizeof(from) - strlen(from),
!                   "%s%s%s", 
  		  e->from->mailbox,
  		  e->from->host ? "@@" : "",
  		  e->from->host ? e->from->host : "");
@


1.1
log
@Add a patch to address the known remote buffer overflow, from
Mike Silbersack <silby@@silby.com>. Add a build- and install-time
warning about the probable existence of further remote security
problems, and remove FORBIDDEN.

Submitted by:	Mike Silbersack <silby@@silby.com>
@
text
@@
