From owner-svn-ports-head@FreeBSD.ORG Fri Oct 26 08:46:41 2012 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 1314E529; Fri, 26 Oct 2012 08:46:41 +0000 (UTC) (envelope-from rea@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:4f8:fff6::2c]) by mx1.freebsd.org (Postfix) with ESMTP id EC3D28FC12; Fri, 26 Oct 2012 08:46:40 +0000 (UTC) Received: from svn.freebsd.org (localhost [127.0.0.1]) by svn.freebsd.org (8.14.4/8.14.4) with ESMTP id q9Q8ke8Z061485; Fri, 26 Oct 2012 08:46:40 GMT (envelope-from rea@svn.freebsd.org) Received: (from rea@localhost) by svn.freebsd.org (8.14.4/8.14.4/Submit) id q9Q8keYN061480; Fri, 26 Oct 2012 08:46:40 GMT (envelope-from rea@svn.freebsd.org) Message-Id: <201210260846.q9Q8keYN061480@svn.freebsd.org> From: Eygene Ryabinkin Date: Fri, 26 Oct 2012 08:46:40 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r306428 - in head: mail/exim security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 26 Oct 2012 08:46:41 -0000 Author: rea Date: Fri Oct 26 08:46:40 2012 New Revision: 306428 URL: http://svn.freebsd.org/changeset/ports/306428 Log: mail/exim: upgrade to 4.80.1 This is bugfix-only release, it eliminates remote code execution in the DKIM code. Security: http://www.vuxml.org/freebsd/b0f3ab1f-1f3b-11e2-8fe9-0022156e8794.html QA page: http://codelabs.ru/fbsd/ports/qa/mail/exim/4.80.1 Feature safe: yes Modified: head/mail/exim/Makefile head/mail/exim/distinfo head/security/vuxml/vuln.xml Modified: head/mail/exim/Makefile ============================================================================== --- head/mail/exim/Makefile Fri Oct 26 08:37:10 2012 (r306427) +++ head/mail/exim/Makefile Fri Oct 26 08:46:40 2012 (r306428) @@ -78,7 +78,7 @@ PLIST_SUB+= SO_1024="" PLIST_SUB+= SO_1024="@comment " .endif -EXIM_VERSION= 4.80 +EXIM_VERSION= 4.80.1 SA_EXIM_VERSION=4.2 SO_1024_VERSION=3.2 Modified: head/mail/exim/distinfo ============================================================================== --- head/mail/exim/distinfo Fri Oct 26 08:37:10 2012 (r306427) +++ head/mail/exim/distinfo Fri Oct 26 08:46:40 2012 (r306428) @@ -1,5 +1,5 @@ -SHA256 (exim/exim-4.80.tar.bz2) = 787b6defd37fa75311737bcfc42e9e2b2cc62c5d027eed35bb7d800b2d9a0984 -SIZE (exim/exim-4.80.tar.bz2) = 1649827 +SHA256 (exim/exim-4.80.1.tar.bz2) = 9565b10f06be224fd03adafae2e07e6fdbb479f8873e3894ddb13f98eeebe78f +SIZE (exim/exim-4.80.1.tar.bz2) = 1650082 SHA256 (exim/sa-exim-4.2.tar.gz) = 72e0a735547f18b05785e6c58a71d24623858f0f5234a5dc0e24cb453999e99a SIZE (exim/sa-exim-4.2.tar.gz) = 66575 SHA256 (exim/spamooborona1024-src-3.2.tar.gz) = ab22a430f3860460045f6b213c68c89700a0cd10cbb6c7a808ece326c53787ee Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Oct 26 08:37:10 2012 (r306427) +++ head/security/vuxml/vuln.xml Fri Oct 26 08:46:40 2012 (r306428) @@ -51,6 +51,45 @@ Note: Please add new entries to the beg --> + + Exim -- remote code execution + + + exim + 4.704.80.1 + + + + +

This vulnerability affects Exim instances built with DKIM + enabled (this is the default for FreeBSD Exim port) and running + verification of DKIM signatures on the incoming mail + messages.

+

Phil Penncock reports:

+
+

This is a SECURITY release, addressing a CRITICAL remote + code execution flaw in versions of Exim between 4.70 and + 4.80 inclusive, when built with DKIM support (the default).

+

This security vulnerability can be exploited by anyone + who can send email from a domain for which they control the + DNS.

+

You are not vulnerable if you built Exim with DISABLE_DKIM + or if you put this at the start of an ACL plumbed into + acl_smtp_connect or acl_smtp_rcpt:

+
warn control = dkim_disable_verify
+
+ +
+ + CVE-2012-5671 + https://lists.exim.org/lurker/message/20121026.080330.74b9147b.en.html + + + 2012-10-25 + 2012-10-26 + +
+ django -- multiple vulnerabilities