aboutsummaryrefslogtreecommitdiffstats
path: root/mail/exim
diff options
context:
space:
mode:
authorsem <sem@FreeBSD.org>2005-01-05 17:02:29 +0800
committersem <sem@FreeBSD.org>2005-01-05 17:02:29 +0800
commit69cfdb0cb233931d8a9d461167451e12226f223e (patch)
tree922f0c27b09e40dc9cd5bbe2c1963295a8bc5449 /mail/exim
parent8e7c6760e9082401e8c20948be7dbdbbc2a6e461 (diff)
downloadfreebsd-ports-gnome-69cfdb0cb233931d8a9d461167451e12226f223e.tar.gz
freebsd-ports-gnome-69cfdb0cb233931d8a9d461167451e12226f223e.tar.zst
freebsd-ports-gnome-69cfdb0cb233931d8a9d461167451e12226f223e.zip
- Fix two possible security vulnerabilities.
Approved by: portmgr (marcus)
Diffstat (limited to 'mail/exim')
-rw-r--r--mail/exim/Makefile2
-rw-r--r--mail/exim/files/patch-securityfix123
2 files changed, 124 insertions, 1 deletions
diff --git a/mail/exim/Makefile b/mail/exim/Makefile
index 361274a9748e..2bd8ae7412e3 100644
--- a/mail/exim/Makefile
+++ b/mail/exim/Makefile
@@ -7,7 +7,7 @@
PORTNAME= exim
PORTVERSION?= ${EXIM_VERSION}+${EXISCAN_VERSION}
-PORTREVISION= 0
+PORTREVISION= 1
CATEGORIES= mail
MASTER_SITES= ${MASTER_SITE_EXIM:S/$/:exim/}
MASTER_SITE_SUBDIR= exim4/:exim
diff --git a/mail/exim/files/patch-securityfix b/mail/exim/files/patch-securityfix
new file mode 100644
index 000000000000..1bd5fa9c1a0c
--- /dev/null
+++ b/mail/exim/files/patch-securityfix
@@ -0,0 +1,123 @@
+--- src/lookups/dnsdb.c.orig Wed Jan 5 03:56:48 2005
++++ src/lookups/dnsdb.c Wed Jan 5 03:57:53 2005
+@@ -125,7 +125,7 @@
+ /* If the type is PTR, we have to construct the relevant magic lookup
+ key. This code is now in a separate function. */
+
+-if (type == T_PTR)
++if (type == T_PTR && string_is_ip_address(keystring, NULL))
+ {
+ dns_build_reverse(keystring, buffer);
+ keystring = buffer;
+--- src/host.c.orig Wed Jan 5 03:56:59 2005
++++ src/host.c Wed Jan 5 03:57:53 2005
+@@ -710,12 +710,18 @@
+
+ if (*p == ':') p++;
+
+- /* Split the address into components separated by colons. */
++ /* Split the address into components separated by colons. The input address
++ is supposed to be checked for syntax. There was a case where this was
++ overlooked; to guard against that happening again, check here and crash if
++ there is a violation. */
+
+ while (*p != 0)
+ {
+ int len = Ustrcspn(p, ":");
+ if (len == 0) nulloffset = ci;
++ if (ci > 7) log_write(0, LOG_MAIN|LOG_PANIC_DIE,
++ "Internal error: invalid IPv6 address \"%s\" passed to host_aton()",
++ address);
+ component[ci++] = p;
+ p += len;
+ if (*p == ':') p++;
+--- src/auths/auth-spa.c.orig Wed Jan 5 03:57:15 2005
++++ src/auths/auth-spa.c Wed Jan 5 03:57:53 2005
+@@ -404,8 +404,11 @@
+ *out = '\0';
+ }
+
++
++/* The outlength parameter was added by PH, December 2004 */
++
+ int
+-spa_base64_to_bits (char *out, const char *in)
++spa_base64_to_bits (char *out, int outlength, const char *in)
+ /* base 64 to raw bytes in quasi-big-endian order, returning count of bytes */
+ {
+ int len = 0;
+@@ -418,6 +421,8 @@
+
+ do
+ {
++ if (len >= outlength) /* Added by PH */
++ return (-1); /* Added by PH */
+ digit1 = in[0];
+ if (DECODE64 (digit1) == BAD)
+ return (-1);
+@@ -435,11 +440,15 @@
+ ++len;
+ if (digit3 != '=')
+ {
++ if (len >= outlength) /* Added by PH */
++ return (-1); /* Added by PH */
+ *out++ =
+ ((DECODE64 (digit2) << 4) & 0xf0) | (DECODE64 (digit3) >> 2);
+ ++len;
+ if (digit4 != '=')
+ {
++ if (len >= outlength) /* Added by PH */
++ return (-1); /* Added by PH */
+ *out++ = ((DECODE64 (digit3) << 6) & 0xc0) | DECODE64 (digit4);
+ ++len;
+ }
+--- src/auths/auth-spa.h.orig Wed Jan 5 03:57:27 2005
++++ src/auths/auth-spa.h Wed Jan 5 03:57:53 2005
+@@ -9,6 +9,9 @@
+ * All the code used here was torn by Marc Prud'hommeaux out of the
+ * Samba project (by Andrew Tridgell, Jeremy Allison, and others).
+ */
++
++/* December 2004: The spa_base64_to_bits() function has no length checking in
++it. I have added a check. PH */
+
+ /* It seems that some systems have existing but different definitions of some
+ of the following types. I received a complaint about "int16" causing
+@@ -75,7 +78,7 @@
+ #define spa_request_length(ptr) (((ptr)->buffer - (uint8x*)(ptr)) + (ptr)->bufIndex)
+
+ void spa_bits_to_base64 (unsigned char *, const unsigned char *, int);
+-int spa_base64_to_bits(char *, const char *);
++int spa_base64_to_bits(char *, int, const char *);
+ void spa_build_auth_response (SPAAuthChallenge *challenge,
+ SPAAuthResponse *response, char *user, char *password);
+ void spa_build_auth_request (SPAAuthRequest *request, char *user,
+--- src/auths/spa.c.orig Wed Jan 5 03:57:38 2005
++++ src/auths/spa.c Wed Jan 5 03:57:53 2005
+@@ -133,7 +133,7 @@
+ return FAIL;
+ }
+
+-if (spa_base64_to_bits((char *)(&request), (const char *)(data)) < 0)
++if (spa_base64_to_bits((char *)(&request), sizeof(request), (const char *)(data)) < 0)
+ {
+ DEBUG(D_auth) debug_printf("auth_spa_server(): bad base64 data in "
+ "request: %s\n", data);
+@@ -153,7 +153,7 @@
+ }
+
+ /* dump client response */
+-if (spa_base64_to_bits((char *)(&response), (const char *)(data)) < 0)
++if (spa_base64_to_bits((char *)(&response), sizeof(response), (const char *)(data)) < 0)
+ {
+ DEBUG(D_auth) debug_printf("auth_spa_server(): bad base64 data in "
+ "response: %s\n", data);
+@@ -319,7 +319,7 @@
+ /* convert the challenge into the challenge struct */
+ DSPA("\n\n%s authenticator: challenge (%s)\n\n",
+ ablock->name, buffer + 4);
+- spa_base64_to_bits ((char *)(&challenge), (const char *)(buffer + 4));
++ spa_base64_to_bits ((char *)(&challenge), sizeof(challenge), (const char *)(buffer + 4));
+
+ spa_build_auth_response (&challenge, &response,
+ CS username, CS password);