From cf3cd306062a08969c41a1cdd32c6855f1abecf1 Mon Sep 17 00:00:00 2001 From: "Heiko Schlittermann (HS12-RIPE)" Date: Mon, 5 Feb 2018 22:23:32 +0100 Subject: Fix base64d() buffer size (CVE-2018-6789) Credits for discovering this bug: Meh Chang (cherry picked from commit 062990cc1b2f9e5d82a413b53c8f0569075de700) --- doc/doc-txt/ChangeLog | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) (limited to 'doc') diff --git a/doc/doc-txt/ChangeLog b/doc/doc-txt/ChangeLog index 1ee00168f..8ae418ab1 100644 --- a/doc/doc-txt/ChangeLog +++ b/doc/doc-txt/ChangeLog @@ -5,8 +5,8 @@ affect Exim's operation, with an unchanged configuration file. For new options, and new features, see the NewStuff file next to this ChangeLog. -Exim version 4.91 ------------------ +Since Exim version 4.90 +----------------------- JH/01 Replace the store_release() internal interface with store_newblock(), which internalises the check required to safely use the old one, plus @@ -82,6 +82,8 @@ JH/15 Relax results from ACL control request to enable cutthrough, in ignoring. This covers use with PRDR, frozen messages, queue-only and fake-reject. +HS/01 Fix Buffer overflow in base64d() (CVE-2018-6789) + JH/16 Fix bug in DKIM verify: a buffer overflow could corrupt the malloc metadata, resulting in a crash in free(). -- cgit v1.2.3