aboutsummaryrefslogtreecommitdiffstats
path: root/community
diff options
context:
space:
mode:
authorNatanael Copa <ncopa@alpinelinux.org>2017-07-04 16:01:53 +0000
committerNatanael Copa <ncopa@alpinelinux.org>2017-07-04 16:01:53 +0000
commitc36891f9148bb4566de67ddf7aec3b9b2c161201 (patch)
tree23b1377465209a93291ce02b09e10cf3f7fe6eaa /community
parent195489d518b8e70928436fa81f521e5fa7527175 (diff)
downloadaports-c36891f9148bb4566de67ddf7aec3b9b2c161201.tar.bz2
aports-c36891f9148bb4566de67ddf7aec3b9b2c161201.tar.xz
community/exim: security fix for CVE-2017-1000369
fixes #7460
Diffstat (limited to 'community')
-rw-r--r--community/exim/APKBUILD8
-rw-r--r--community/exim/CVE-2017-1000369.patch47
2 files changed, 54 insertions, 1 deletions
diff --git a/community/exim/APKBUILD b/community/exim/APKBUILD
index df470441d3..5399297398 100644
--- a/community/exim/APKBUILD
+++ b/community/exim/APKBUILD
@@ -6,7 +6,7 @@
# Maintainer: Jesse Young <jlyo@jlyo.org>
pkgname=exim
pkgver=4.89
-pkgrel=4
+pkgrel=5
pkgdesc="A Message Transfer Agent"
url="http://www.exim.org/"
arch="all"
@@ -21,6 +21,7 @@ install="exim.pre-install"
subpackages="$pkgname-cdb $pkgname-dbmdb $pkgname-dnsdb $pkgname-sqlite $pkgname-mysql $pkgname-postgresql
$pkgname-utils $pkgname-scripts::noarch $pkgname-doc"
source="ftp://ftp.exim.org/pub/exim/exim4/$pkgname-$pkgver.tar.xz
+ CVE-2017-1000369.patch
exim.Makefile
exim.confd
exim.initd
@@ -28,6 +29,10 @@ source="ftp://ftp.exim.org/pub/exim/exim4/$pkgname-$pkgver.tar.xz
exim.gencert"
builddir="$srcdir/$pkgname-$pkgver"
+# secfixes:
+# 4.89-r5:
+# - CVE-2017-1000369
+
prepare() {
default_prepare || return 1
@@ -101,6 +106,7 @@ dbmdb() { _mv_ext dbmdb; }
dnsdb() { _mv_ext dnsdb; }
sha512sums="ce5faef3847a5baf1b4fec1ffe46ce7efaafb24e63bcc52a61f38e8312a88eccaa816c3947ba428bef3eed38b1e91e606f6ed07bc0a3e14c6a6ed0ecb41eb9fa exim-4.89.tar.xz
+cffe895974e9f570e2f60583206e0c2865e9ca400636e5ed2117c531fc62b03753f41286565ee253c11610e61589275cb5235b34cae052b5dcc6e5c37fbc7ece CVE-2017-1000369.patch
e9524d3a2cc230b4ecb3b098f53247121b9582fc7807b1549c5a3fd54bb416b837c4e09476f2e01dca03d590a968c40bf90d4b6a9f8a4abad082fdec91916a0f exim.Makefile
bb6f5ead067af19ace661cc92bcd428da97570aedd1f9dc5b61a34e7e3fb3e028be6c96d51df73353bdfcaf69a3ee053fb03d245f868d63ebf518aa96ec82d66 exim.confd
8d0c594c5e3834ddd3a7743c025caf3f5c04f6ac17e25f2278e7a36b726150f0f8e36a1c76cd1a4b454edcb163181ee05ea40a6b61a0e9172c600e4808ccc80f exim.initd
diff --git a/community/exim/CVE-2017-1000369.patch b/community/exim/CVE-2017-1000369.patch
new file mode 100644
index 0000000000..af2e73c5d5
--- /dev/null
+++ b/community/exim/CVE-2017-1000369.patch
@@ -0,0 +1,47 @@
+From 65e061b76867a9ea7aeeb535341b790b90ae6c21 Mon Sep 17 00:00:00 2001
+From: "Heiko Schlittermann (HS12-RIPE)" <hs@schlittermann.de>
+Date: Wed, 31 May 2017 23:08:56 +0200
+Subject: [PATCH] Cleanup (prevent repeated use of -p/-oMr to avoid mem leak)
+
+---
+ doc/doc-docbook/spec.xfpt | 3 ++-
+ src/src/exim.c | 19 +++++++++++++++++--
+ 2 files changed, 19 insertions(+), 3 deletions(-)
+
+diff --git a/src/src/exim.c b/src/src/exim.c
+index 67583e584..88e119778 100644
+--- a/src/src/exim.c
++++ b/src/exim.c
+@@ -3106,7 +3106,14 @@ for (i = 1; i < argc; i++)
+
+ /* -oMr: Received protocol */
+
+- else if (Ustrcmp(argrest, "Mr") == 0) received_protocol = argv[++i];
++ else if (Ustrcmp(argrest, "Mr") == 0)
++
++ if (received_protocol)
++ {
++ fprintf(stderr, "received_protocol is set already\n");
++ exit(EXIT_FAILURE);
++ }
++ else received_protocol = argv[++i];
+
+ /* -oMs: Set sender host name */
+
+@@ -3202,7 +3209,15 @@ for (i = 1; i < argc; i++)
+
+ if (*argrest != 0)
+ {
+- uschar *hn = Ustrchr(argrest, ':');
++ uschar *hn;
++
++ if (received_protocol)
++ {
++ fprintf(stderr, "received_protocol is set already\n");
++ exit(EXIT_FAILURE);
++ }
++
++ hn = Ustrchr(argrest, ':');
+ if (hn == NULL)
+ {
+ received_protocol = argrest;