Re: Quarterly branch ports question
- Reply: Pat : "Re: Quarterly branch ports question"
- In reply to: Pat : "Quarterly branch ports question"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sat, 20 Jul 2024 19:15:03 UTC
On 7/20/24 11:43, Pat wrote:
> Hello all,
>
> I maintain a FreeBSD 13 server that acts as an MTA on an
> internal network. It rums Exim, and is configured to update
> from the URL "pkg+http://pkg.FreeBSD.org/${ABI}/quarterly".
>
> Today pkg upgrade installed version exim-4.97.1_5. I do not
> recall that version being available last week, so I assume this
> is a security release?
Changelog shows 4.95.1_5 was to bump to consumers of its dependency
dns/libidn:
https://cgit.freebsd.org/ports/commit/mail/exim?h=2024Q3&id=bae03bdd17b294e3354848e123f3ec4bd9b7592a
. That change is a version bump just to guarantee that if rebuilding
installed ports with tools like portupgrade/portmaster that exim will
also get rebuilt. It does not change anything about the exim program's
code/buildsteps. Refer to
https://docs.freebsd.org/en/books/porters-handbook/makefiles/#makefile-portrevision
for further clarification of the use of this variable that was modified
in the port.
> How can I find the changes introduced since version
> exim-4.97.1_4, which is what the server was at until the
> upgrade?
Easiest way I do it in a web browser is navigate to cgit.freebsd.org,
click on ports, click on the branch you want (the newest quarterly
branch), switch the view to 'tree', click the desired category (mail),
click on the port (exim). From here you can click on log at the top for
changes to the port as a whole or click on other links for log and
changes to individual files.
> In particular I'm curious to know if this version addresses
> CVE-2024-39929 (https://bugs.exim.org/show_bug.cgi?id=3099
> <https://bugs.exim.org/show_bug.cgi?id=3099>) by any
> chance. This is just an exercise in curiosity, and a chance to learn
> more about FreeBSD ports and packages.
Skimming over that bug report, it looks like fixes on 7/1 and 7/2
went into exim's codebase but I only see notes of fixing it on 4.98.
https://git.exim.org/exim.git/shortlog/refs/heads/exim-4.97+security was
last updated 6 months ago so it does not look like the exim project has
fixed 4.97 themselves.
If this gets fixed for 4.97, I'd expect the change to the FreeBSD
port to either include a distinfo change about the file it downloads to
be for a fixed archive, download the patch separately, or have the
./files/ updated to include the patch or have the Makefile modified to
include the patch.
I don't follow how security is decided too well but I presume that
the deswcription would apply to any platform running exim so it could be
a candidate to maybe be a vuxml database entry.
> Thanks!
> Pat