163 Commits

Author SHA1 Message Date
tb
db723269d6 mail/exim: Stop reaching into libcrypto internals and use the API instead. 2021-10-31 17:05:37 +00:00
sthen
a9b435e732 update to exim-4.95, from maintainer Renaud Allard 2021-10-22 17:24:53 +00:00
tb
1907ab667c mail/exim: avoid upcoming build failure
exim uses its own SSL_CIPHER_get_id() which replaces libssl's version
with one that will break once we make SSL_CIPHER opaque.

seems fine to Renaud Allard (maintainer)
2021-05-05 15:08:15 +00:00
sthen
769283eb4e exim: add a patch from maintainer to workaround API change in opendmarc 2021-05-04 15:48:53 +00:00
sthen
fbf05029bd update to exim-4.94.2, from maintainer Renaud Allard
Fixes many issues reported (with fixes) last year by Qualys, details will be
available later at https://www.qualys.com/2021/05/04/21nails/21nails.txt

Local vulnerabilities
- CVE-2020-28007: Link attack in Exim's log directory
- CVE-2020-28008: Assorted attacks in Exim's spool directory
- CVE-2020-28014: Arbitrary PID file creation
- CVE-2020-28011: Heap buffer overflow in queue_run()
- CVE-2020-28010: Heap out-of-bounds write in main()
- CVE-2020-28013: Heap buffer overflow in parse_fix_phrase()
- CVE-2020-28016: Heap out-of-bounds write in parse_fix_phrase()
- CVE-2020-28015: New-line injection into spool header file (local)
- CVE-2020-28012: Missing close-on-exec flag for privileged pipe
- CVE-2020-28009: Integer overflow in get_stdinput()

Remote vulnerabilities
- CVE-2020-28017: Integer overflow in receive_add_recipient()
- CVE-2020-28020: Integer overflow in receive_msg()
- CVE-2020-28023: Out-of-bounds read in smtp_setup_msg()
- CVE-2020-28021: New-line injection into spool header file (remote)
- CVE-2020-28022: Heap out-of-bounds read and write in extract_option()
- CVE-2020-28026: Line truncation and injection in spool_read_header()
- CVE-2020-28019: Failure to reset function pointer after BDAT error
- CVE-2020-28024: Heap buffer underflow in smtp_ungetc()
- CVE-2020-28018: Use-after-free in tls-openssl.c
- CVE-2020-28025: Heap out-of-bounds read in pdkim_finish_bodyhash()
2021-05-04 13:49:04 +00:00
sthen
8ed484cafc Patch exim's os file to use getifaddrs instead of fetching addresses
via SIOCGIFCONF. From maintainer.
2021-03-27 13:49:13 +00:00
sthen
79258b82b5 build exim with opendmarc support, from maintainer Renaud Allard 2021-03-19 15:59:50 +00:00
sthen
fc58edad0a update to exim-4.94, from Renaud Allard.
rather than patching to remove CFLAGS unsupported by gcc 4.2, just pass in
CFLAGS via MAKE_FLAGS instead (also pass in CC).
2020-06-02 12:44:19 +00:00
sthen
ede44decd2 update to exim-4.93.0.4, from maintainer Renaud Allard 2020-01-09 20:43:15 +00:00
cwen
3dc1c76b43 exim: unbreak on base-gcc archs by using `-std=gnu99' only for them.
input and OK sthen@, OK Renaud Allard (maintainer)
2019-12-29 23:01:54 +00:00
sthen
1f41c56a73 The last commit removing -Wno-logical-op-parentheses made it apparent
that -Wno-logical-op-parentheses doesn't work on some compilers either.
2019-12-27 22:31:01 +00:00
sthen
523fd4684d Don't use -Wno-logical-op-parentheses, not all compilers support it 2019-12-24 14:45:41 +00:00
sthen
3a71699d1a regen 2019-12-16 14:40:55 +00:00
sthen
e09f765163 update to exim 4.93.0.3, from Renauld Allard 2019-12-16 14:40:39 +00:00
sthen
3636529ad5 update to exim-4.93, from maintainer Renaud Allard, plus I enabled
DEBUG_PACKAGES
2019-12-10 23:21:37 +00:00
sthen
cf5220b10d security update to exim-4.92.3; ok Renaud Allard (maintainer)
"There is a heap-based buffer overflow in string_vformat (string.c).
The currently known exploit uses a extraordinary long EHLO string to
crash the Exim process that is receiving the message. While at this
mode of operation Exim already dropped its privileges, other paths to
reach the vulnerable code may exist."
2019-09-29 18:08:55 +00:00
sthen
0e7970f59a security update to Exim 4.92.2: CVE-2019-15846
"local or remote attacker can execute programs with root privileges"
from maintainer Renaud Allard
2019-09-06 10:09:35 +00:00
sthen
53896e128a security update to exim-4.92.1, from maintainer Renauld Allard
https://www.exim.org/static/doc/security/CVE-2019-13917.txt
2019-07-31 11:20:32 +00:00
sthen
3318ced016 replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes 2019-07-12 20:46:54 +00:00
sthen
4d9c380aec build exim with spf support, from maintainer Renaud Allard 2019-03-28 12:48:09 +00:00
sthen
93e59dc60b update to exim-4.92, from maintainer Renauld Allard (plus I updated the PLIST) 2019-02-12 11:48:33 +00:00
sthen
9ed5d7752f update to exim-4.91, from Renaud Allard (taking maintainer)
switch build configuration from a modified static copy of a file from
exim distribution in files/ to copying and patching the actual file from
the distribution, this was badly out of sync with upstream. done by me
based on Renaud's partial update.
2018-04-19 20:52:43 +00:00
sthen
1055ea285d update to exim-4.90.1, CVE-2018-6789 buffer overflow in base64d()
"Using a handcrafted message, remote code execution seems to be possible"

thanks to whichever of the distributions that was under embargo and
released early, as this means that the fix was made available sooner
than it would have otherwise been.
2018-02-10 22:28:29 +00:00
sthen
a22c4eadeb Remove the rc_pre check that silently disables exim if /etc/mailer.conf.exim
is present (presumably intended to ensure that 'exim-enable' has been run,
but the other MTAs don't do this). From Christian Gut, ok jca@
2018-02-05 22:34:17 +00:00
rpe
214644a454 Now that all ports rc.* scripts are using #!/bin/ksh
- change [] tests to [[]]
- change arithmetic [] tests to (())
- change = to == inside [[]]
- remove unecessary quoting inside [[]]

OK aja@
2018-01-14 14:42:18 +00:00
rpe
9a8b5ccd06 Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
daemon scripts and bump subpackages that contain the *.rc scripts.

discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
sthen
b24c690964 update to exim-4.89.1, fixing CVE-2017-16943 (previously handled in a patch)
and CVE-2017-16944, and other fixes.

Alternative workaround for these two CVEs: disable the SMTP CHUNKING extension
by adding "chunking_advertise_hosts =" to the main configuration section (empty
right-hand-side).
2017-12-01 14:38:24 +00:00
sthen
82bc31baad Add patch for Exim remote code execution in 4.88+.
https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html
https://bugs.exim.org/show_bug.cgi?id=2199

There is also another issue which is at least a DoS,
https://bugs.exim.org/show_bug.cgi?id=2201 that is *not* patched yet.
The workaround below would help both cases.

From upstream:

"With immediate effect, please apply this workaround: if you are running
Exim 4.88 or newer (4.89 is current, 4.90 is upcoming) then in the main
section of your Exim configuration, set:

chunking_advertise_hosts =

That's an empty value, nothing on the right of the equals. This
disables advertising the ESMTP CHUNKING extension, making the BDAT verb
unavailable and avoids letting an attacker apply the logic. "
2017-11-25 13:04:53 +00:00
sthen
087a45ec5f update to exim-4.89 2017-03-08 17:05:34 +00:00
sthen
9b9f3cc2c4 security update to exim-4.88, changelog includes
JH/27 Fix a possible security hole, wherein a process operating with the Exim
      UID can gain a root shell.  Credit to http://www.halfdog.net/ for
      discovery and writeup.  Ubuntu bug 1580454; no bug raised against Exim
      itself :(

JH/34 SECURITY: Use proper copy of DATA command in error message.
      Could leak key material.  Remotely explaoitable.  CVE-2016-9963.

whoever decided to have an embargo period ending on 25 December: this was
not a particularly good idea
2016-12-25 21:13:35 +00:00
sthen
6b91ef09e2 Enable LMTP transport in mail/exim, requested by Thomas Schneider 2016-12-24 16:02:10 +00:00
naddy
67696d3f54 replace libiconv module 2016-09-12 17:51:07 +00:00
sthen
be8dfb30fb sync WANTLIB 2016-07-09 08:46:24 +00:00
sthen
960b0b5376 update to exim-4.87 2016-04-06 21:41:55 +00:00
sthen
b8bfc161d0 fix ECDH as server in Exim, from Renaud Allard 2016-03-07 15:34:16 +00:00
sthen
e40eaaffe4 security update to exim 4.86.2: clean the environment and "cd /" at startup.
"Any user who can start an instance of Exim (and this is normally *any* user)
can gain root privileges. If you do not use 'perl_startup' you *should* be
safe."  CVE-2016-1531
2016-03-02 20:13:54 +00:00
sthen
0f4034be36 sync WANTLIB 2015-08-17 19:10:11 +00:00
sthen
6657f4409c update to exim-4.86 2015-08-12 22:11:57 +00:00
ajacoutot
29d027b433 No need to override pexp. 2015-07-15 17:10:35 +00:00
kirby
d4b52dcb7a - sort variables
- add some blank lines for higher readability
 - drop USE_GROFF (mandoc version looks better)
 - bump for safety
OK sthen@
2015-01-15 21:39:36 +00:00
sthen
d05d6f7b23 update to exim 4.85 2015-01-13 18:00:23 +00:00
brad
b94a402501 Switch from using MySQL to using MariaDB attempt #2. MariaDB is a drop-in replacement.
ok sthen@
2014-09-13 18:09:20 +00:00
espie
92816cd8fc use more specific version of SUBST_* where appropriate 2014-08-10 09:58:04 +00:00
sthen
9f28de8726 update to Exim 4.83, fixes CVE-2014-2972 - more information at
https://lists.exim.org/lurker/message/20140722.152452.d6c019e8.en.html

ok naddy@
2014-07-23 10:36:24 +00:00
sthen
a0d80c8574 update to exim 4.82.1 2014-05-28 14:23:27 +00:00
sthen
d8571d678e disable tcp wrappers 2014-03-24 17:39:35 +00:00
sthen
b864d2ea42 default MTA is now smtpd not sendmail 2014-03-13 14:50:41 +00:00
sthen
bdf2ba6883 don't use arc4random_stir to seed 2013-10-22 08:46:10 +00:00
sthen
c704d5b9bf update to exim 4.80.1, and drop fkr@ as maintainer at his request 2013-08-24 09:22:25 +00:00
brad
17833ea850 Revert back to using MySQL 5.1 for the time being. MariaDB 5.5 introduces
a new libmysqlclient non-blocking API which utilizes co-routines. The X86
specific GCC ASM co-routine support hid the fact that there was an issue.
The only fallback code so far is POSIX user contexts which OpenBSD does not
support.

Input from and Ok sthen@ jasper@
2013-06-12 20:36:33 +00:00