142 Commits

Author SHA1 Message Date
sthen
9ed5d7752f update to exim-4.91, from Renaud Allard (taking maintainer)
switch build configuration from a modified static copy of a file from
exim distribution in files/ to copying and patching the actual file from
the distribution, this was badly out of sync with upstream. done by me
based on Renaud's partial update.
2018-04-19 20:52:43 +00:00
sthen
1055ea285d update to exim-4.90.1, CVE-2018-6789 buffer overflow in base64d()
"Using a handcrafted message, remote code execution seems to be possible"

thanks to whichever of the distributions that was under embargo and
released early, as this means that the fix was made available sooner
than it would have otherwise been.
2018-02-10 22:28:29 +00:00
sthen
a22c4eadeb Remove the rc_pre check that silently disables exim if /etc/mailer.conf.exim
is present (presumably intended to ensure that 'exim-enable' has been run,
but the other MTAs don't do this). From Christian Gut, ok jca@
2018-02-05 22:34:17 +00:00
rpe
214644a454 Now that all ports rc.* scripts are using #!/bin/ksh
- change [] tests to [[]]
- change arithmetic [] tests to (())
- change = to == inside [[]]
- remove unecessary quoting inside [[]]

OK aja@
2018-01-14 14:42:18 +00:00
rpe
9a8b5ccd06 Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
daemon scripts and bump subpackages that contain the *.rc scripts.

discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
sthen
b24c690964 update to exim-4.89.1, fixing CVE-2017-16943 (previously handled in a patch)
and CVE-2017-16944, and other fixes.

Alternative workaround for these two CVEs: disable the SMTP CHUNKING extension
by adding "chunking_advertise_hosts =" to the main configuration section (empty
right-hand-side).
2017-12-01 14:38:24 +00:00
sthen
82bc31baad Add patch for Exim remote code execution in 4.88+.
https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html
https://bugs.exim.org/show_bug.cgi?id=2199

There is also another issue which is at least a DoS,
https://bugs.exim.org/show_bug.cgi?id=2201 that is *not* patched yet.
The workaround below would help both cases.

From upstream:

"With immediate effect, please apply this workaround: if you are running
Exim 4.88 or newer (4.89 is current, 4.90 is upcoming) then in the main
section of your Exim configuration, set:

chunking_advertise_hosts =

That's an empty value, nothing on the right of the equals. This
disables advertising the ESMTP CHUNKING extension, making the BDAT verb
unavailable and avoids letting an attacker apply the logic. "
2017-11-25 13:04:53 +00:00
sthen
087a45ec5f update to exim-4.89 2017-03-08 17:05:34 +00:00
sthen
9b9f3cc2c4 security update to exim-4.88, changelog includes
JH/27 Fix a possible security hole, wherein a process operating with the Exim
      UID can gain a root shell.  Credit to http://www.halfdog.net/ for
      discovery and writeup.  Ubuntu bug 1580454; no bug raised against Exim
      itself :(

JH/34 SECURITY: Use proper copy of DATA command in error message.
      Could leak key material.  Remotely explaoitable.  CVE-2016-9963.

whoever decided to have an embargo period ending on 25 December: this was
not a particularly good idea
2016-12-25 21:13:35 +00:00
sthen
6b91ef09e2 Enable LMTP transport in mail/exim, requested by Thomas Schneider 2016-12-24 16:02:10 +00:00
naddy
67696d3f54 replace libiconv module 2016-09-12 17:51:07 +00:00
sthen
be8dfb30fb sync WANTLIB 2016-07-09 08:46:24 +00:00
sthen
960b0b5376 update to exim-4.87 2016-04-06 21:41:55 +00:00
sthen
b8bfc161d0 fix ECDH as server in Exim, from Renaud Allard 2016-03-07 15:34:16 +00:00
sthen
e40eaaffe4 security update to exim 4.86.2: clean the environment and "cd /" at startup.
"Any user who can start an instance of Exim (and this is normally *any* user)
can gain root privileges. If you do not use 'perl_startup' you *should* be
safe."  CVE-2016-1531
2016-03-02 20:13:54 +00:00
sthen
0f4034be36 sync WANTLIB 2015-08-17 19:10:11 +00:00
sthen
6657f4409c update to exim-4.86 2015-08-12 22:11:57 +00:00
ajacoutot
29d027b433 No need to override pexp. 2015-07-15 17:10:35 +00:00
kirby
d4b52dcb7a - sort variables
- add some blank lines for higher readability
 - drop USE_GROFF (mandoc version looks better)
 - bump for safety
OK sthen@
2015-01-15 21:39:36 +00:00
sthen
d05d6f7b23 update to exim 4.85 2015-01-13 18:00:23 +00:00
brad
b94a402501 Switch from using MySQL to using MariaDB attempt #2. MariaDB is a drop-in replacement.
ok sthen@
2014-09-13 18:09:20 +00:00
espie
92816cd8fc use more specific version of SUBST_* where appropriate 2014-08-10 09:58:04 +00:00
sthen
9f28de8726 update to Exim 4.83, fixes CVE-2014-2972 - more information at
https://lists.exim.org/lurker/message/20140722.152452.d6c019e8.en.html

ok naddy@
2014-07-23 10:36:24 +00:00
sthen
a0d80c8574 update to exim 4.82.1 2014-05-28 14:23:27 +00:00
sthen
d8571d678e disable tcp wrappers 2014-03-24 17:39:35 +00:00
sthen
b864d2ea42 default MTA is now smtpd not sendmail 2014-03-13 14:50:41 +00:00
sthen
bdf2ba6883 don't use arc4random_stir to seed 2013-10-22 08:46:10 +00:00
sthen
c704d5b9bf update to exim 4.80.1, and drop fkr@ as maintainer at his request 2013-08-24 09:22:25 +00:00
brad
17833ea850 Revert back to using MySQL 5.1 for the time being. MariaDB 5.5 introduces
a new libmysqlclient non-blocking API which utilizes co-routines. The X86
specific GCC ASM co-routine support hid the fact that there was an issue.
The only fallback code so far is POSIX user contexts which OpenBSD does not
support.

Input from and Ok sthen@ jasper@
2013-06-12 20:36:33 +00:00
brad
0b77cf86a5 Switch from using MySQL to using MariaDB. MariaDB is a drop-in replacement.
ok sthen aja
2013-05-25 00:33:09 +00:00
espie
0662a4e9d6 PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:20:26 +00:00
sthen
bb687e1b39 SECURITY fix for Exim CVE-2012-5671 - Remote code execution with DKIM decoding
Workaround: "You are not vulnerable if <...> you put this at the start
of an ACL plumbed into acl_smtp_connect or acl_smtp_rcpt:

  warn control = dkim_disable_verify"

This is backported from the diff between exim 4.80 and 4.80.1
(not updating fully to 4.80.1 yet as this small diff is safer to commit)

same diff rpointel@
2012-10-26 08:50:01 +00:00
espie
e480fdc726 and bump 2012-04-30 13:08:18 +00:00
espie
941d6f504b sqlite3 dep must die 2012-04-30 13:07:58 +00:00
sthen
91faa22c52 Where a program with an rc script _requires_ a certain command line
parameter to daemonize, move the parameter from daemon to daemon_flags,
so that the user cannot inadvertently prevent it from daemonizing by
adjusting the flags.

Discussed with ajacoutot and schwarze, this method was suggested
by schwarze@ as a simpler alternative to my diff. ok aja@
2011-12-17 22:01:12 +00:00
espie
5a74b62623 new-style pseudo flavors 2011-11-18 13:29:29 +00:00
fkr
dc1f29746e update to exim version 4.77.
This release changes the behaviour of certain expansion methods.
Details can be found here: http://www.gossamer-threads.com/lists/exim/announce/92353

ok sthen@, jasper@ and ajacoutot@
2011-10-19 23:06:57 +00:00
espie
e820071495 normalize pkgpath 2011-09-16 10:31:20 +00:00
sthen
426e1e3b61 Add an rc script for exim, ok aja@ fkr@ 2011-07-17 20:15:59 +00:00
jasper
278e3cc0b0 Sanitize some @unexec/@extraunexec calls to rm: move them up in the
PLIST and delete everything under the @sample'd directory instead of the
directory itself to prevent a warning from pkg_delete(1) trying to
remove a non existing directory and to help preventing left-over files
and directories.

ok aja@
2011-05-11 12:57:47 +00:00
fkr
7332caaf6f update exim to version 4.76.
This contains a security fix for CVE-2011-1764.

ok sthen@ and jasper@
2011-05-09 14:56:56 +00:00
jasper
4cc1d05442 Security fix for CVE-2011-0017
Patch extracted from exim 3.74.

ok fkr@ (MAINTAINER), sthen@, ajacoutot@
2011-02-07 16:01:26 +00:00
fkr
2673316d6b update to exim 4.73.
While this resolves CVE-2010-4344 and CVE-2010-4345, the first was
actually fixed in exim 4.70 and the latter is a no-issue on OpenBSD
due to it always being built with ALT_CONFIG_ROOT_ONLY.

with input from Andreas Voegele
ok sthen@, jasper@
2011-01-12 05:45:29 +00:00
espie
bc8dc9adb1 new depends 2010-11-19 07:23:05 +00:00
espie
f7782d7391 a few email WANTLIBs 2010-11-11 10:54:02 +00:00
espie
dcdfee948c convert libiconv to new wantlib 2010-11-06 10:18:38 +00:00
ajacoutot
ff07e285bc Remove USE_X11. 2010-10-24 20:58:58 +00:00
espie
051dfa8362 USE_GROFF=Yes 2010-10-18 19:59:15 +00:00
fkr
d09cfa575e Update exim to version 4.72.
This includes security fixes for CVE-2010-2023 and CVE-2010-2024.
ok bernd@, sthen@
2010-06-15 08:43:30 +00:00
sthen
8be0f2fc6a Fix RUN_DEPENDS-eximon and FULLPKGPATH-eximon too, they were
varying according to the flavour. ok espie@
2010-02-02 20:23:30 +00:00