41 Commits

Author SHA1 Message Date
sthen
fc58edad0a update to exim-4.94, from Renaud Allard.
rather than patching to remove CFLAGS unsupported by gcc 4.2, just pass in
CFLAGS via MAKE_FLAGS instead (also pass in CC).
2020-06-02 12:44:19 +00:00
sthen
ede44decd2 update to exim-4.93.0.4, from maintainer Renaud Allard 2020-01-09 20:43:15 +00:00
sthen
e09f765163 update to exim 4.93.0.3, from Renauld Allard 2019-12-16 14:40:39 +00:00
sthen
3636529ad5 update to exim-4.93, from maintainer Renaud Allard, plus I enabled
DEBUG_PACKAGES
2019-12-10 23:21:37 +00:00
sthen
cf5220b10d security update to exim-4.92.3; ok Renaud Allard (maintainer)
"There is a heap-based buffer overflow in string_vformat (string.c).
The currently known exploit uses a extraordinary long EHLO string to
crash the Exim process that is receiving the message. While at this
mode of operation Exim already dropped its privileges, other paths to
reach the vulnerable code may exist."
2019-09-29 18:08:55 +00:00
sthen
0e7970f59a security update to Exim 4.92.2: CVE-2019-15846
"local or remote attacker can execute programs with root privileges"
from maintainer Renaud Allard
2019-09-06 10:09:35 +00:00
sthen
53896e128a security update to exim-4.92.1, from maintainer Renauld Allard
https://www.exim.org/static/doc/security/CVE-2019-13917.txt
2019-07-31 11:20:32 +00:00
sthen
93e59dc60b update to exim-4.92, from maintainer Renauld Allard (plus I updated the PLIST) 2019-02-12 11:48:33 +00:00
sthen
9ed5d7752f update to exim-4.91, from Renaud Allard (taking maintainer)
switch build configuration from a modified static copy of a file from
exim distribution in files/ to copying and patching the actual file from
the distribution, this was badly out of sync with upstream. done by me
based on Renaud's partial update.
2018-04-19 20:52:43 +00:00
sthen
1055ea285d update to exim-4.90.1, CVE-2018-6789 buffer overflow in base64d()
"Using a handcrafted message, remote code execution seems to be possible"

thanks to whichever of the distributions that was under embargo and
released early, as this means that the fix was made available sooner
than it would have otherwise been.
2018-02-10 22:28:29 +00:00
sthen
b24c690964 update to exim-4.89.1, fixing CVE-2017-16943 (previously handled in a patch)
and CVE-2017-16944, and other fixes.

Alternative workaround for these two CVEs: disable the SMTP CHUNKING extension
by adding "chunking_advertise_hosts =" to the main configuration section (empty
right-hand-side).
2017-12-01 14:38:24 +00:00
sthen
087a45ec5f update to exim-4.89 2017-03-08 17:05:34 +00:00
sthen
9b9f3cc2c4 security update to exim-4.88, changelog includes
JH/27 Fix a possible security hole, wherein a process operating with the Exim
      UID can gain a root shell.  Credit to http://www.halfdog.net/ for
      discovery and writeup.  Ubuntu bug 1580454; no bug raised against Exim
      itself :(

JH/34 SECURITY: Use proper copy of DATA command in error message.
      Could leak key material.  Remotely explaoitable.  CVE-2016-9963.

whoever decided to have an embargo period ending on 25 December: this was
not a particularly good idea
2016-12-25 21:13:35 +00:00
sthen
960b0b5376 update to exim-4.87 2016-04-06 21:41:55 +00:00
sthen
e40eaaffe4 security update to exim 4.86.2: clean the environment and "cd /" at startup.
"Any user who can start an instance of Exim (and this is normally *any* user)
can gain root privileges. If you do not use 'perl_startup' you *should* be
safe."  CVE-2016-1531
2016-03-02 20:13:54 +00:00
sthen
6657f4409c update to exim-4.86 2015-08-12 22:11:57 +00:00
sthen
d05d6f7b23 update to exim 4.85 2015-01-13 18:00:23 +00:00
sthen
9f28de8726 update to Exim 4.83, fixes CVE-2014-2972 - more information at
https://lists.exim.org/lurker/message/20140722.152452.d6c019e8.en.html

ok naddy@
2014-07-23 10:36:24 +00:00
sthen
a0d80c8574 update to exim 4.82.1 2014-05-28 14:23:27 +00:00
sthen
c704d5b9bf update to exim 4.80.1, and drop fkr@ as maintainer at his request 2013-08-24 09:22:25 +00:00
fkr
dc1f29746e update to exim version 4.77.
This release changes the behaviour of certain expansion methods.
Details can be found here: http://www.gossamer-threads.com/lists/exim/announce/92353

ok sthen@, jasper@ and ajacoutot@
2011-10-19 23:06:57 +00:00
fkr
7332caaf6f update exim to version 4.76.
This contains a security fix for CVE-2011-1764.

ok sthen@ and jasper@
2011-05-09 14:56:56 +00:00
fkr
2673316d6b update to exim 4.73.
While this resolves CVE-2010-4344 and CVE-2010-4345, the first was
actually fixed in exim 4.70 and the latter is a no-issue on OpenBSD
due to it always being built with ALT_CONFIG_ROOT_ONLY.

with input from Andreas Voegele
ok sthen@, jasper@
2011-01-12 05:45:29 +00:00
fkr
d09cfa575e Update exim to version 4.72.
This includes security fixes for CVE-2010-2023 and CVE-2010-2024.
ok bernd@, sthen@
2010-06-15 08:43:30 +00:00
sthen
1ab6ddff29 - update to 4.71
- tweak MESSAGE/DESCR
- drop no_x11 flavour in favour of an -eximon subpackage and a
pseudo-flavour to disable it
- use iconv by default rather than as a flavour
- drop no_exiscan flavour

from bernd@, Bjorn Ketelaars and myself; ok fkr@ bernd@
2009-12-15 11:32:18 +00:00
fkr
d046aca78f update to exim version 4.69
ok jasper@, bernd@
2008-02-03 20:39:11 +00:00
fkr
0d00fecfaa update to version 4.68, change to patches/patch-scripts_exim_install
from Andreas Voegele (as discussed on ports@, binary does not contain
version number anymore)

ok bernd@
2007-09-10 20:08:16 +00:00
fkr
4bbbe701d2 update to exim version 4.67 2007-04-20 18:14:22 +00:00
espie
9eafbbfb35 base64 checksums. 2007-04-05 16:19:55 +00:00
fkr
577efa42bb bump to version 4.66, which (again, *sigh*) fixes bugs that were supposed to be
fixed in 4.65, that were introduced in 4.64.
2007-01-12 21:51:55 +00:00
fkr
000f61ea48 update to exim-4.65 (which mostly fixes two bugs that were introduced in
version 4.64)
2007-01-05 23:47:05 +00:00
fkr
f5e398ecff update to new version 4.64
ok mbalmer@
2006-12-28 12:44:13 +00:00
alek
c942ac8740 Update to 4.63 from Andreas Vgele <andreas@altroot.de> 2006-10-13 15:18:54 +00:00
sturm
c5ae1ebcec update to exim 4.62
from maintainer Andreas Voegele <andreas at altroot.de>
2006-05-05 06:02:30 +00:00
steven
0a3341ad25 Revision 4.60-1 was rerolled into the 4.60 tarball. Only spec.txt changed.
Bump PKGNAME.
ok alek@
2006-02-05 14:30:11 +00:00
sturm
ff3543e506 update to exim 4.60 with new FLAVORS sqlite3 and sasl
from new maintainer Andreas Voegele <voegelas at gmx.net>
timeout from old maintainer
2006-01-15 13:06:42 +00:00
sturm
2ca4ad7fb3 SECURITY update to exim 4.44
This fixes lots of bugs and at least the security issues noticed in
CAN-2005-0021 and CAN-2005-0022.

based on a diff from "Andrey N. Oktyabrski" <ano at antora.ru>
2005-01-26 19:33:20 +00:00
naddy
a8817eabcc SIZE 2005-01-05 16:50:35 +00:00
peter
1536f84b31 Update to exim 4.41.
This is a major update and configuration files are not compatible.
A conversion script is included and installed in

        ${PREFIX}/share/examples/exim4/convert4r4

New co-maintainer and much of the inital work done by Ilya Voronin.

A decision was made to include the semi-official exiscan patch in
the default installation, as most admins appear to use this. It is
hoped that is will become part of the core exim4 code "soon".

This port now creates an _exim user and group if they don't already
exist.

Work and testing by Ilya Voronin, Richard Welty, Axel Rau and others
who I can't now find in my mailbox. Apologies if I left you out.
2004-07-26 10:56:01 +00:00
naddy
78e6e6c509 Update to 3.36; from Peter Galbavy <peter.galbavy@knowtion.net>. 2002-11-21 00:15:10 +00:00
peter
fd8ab7bae8 From the ChangeLog:
Version 3.34
------------
1. Exim was failing to diagnose a lone \ at the end of an expansion string as
an error (basically a typo in the code).

2. If logging was only to syslog, and Exim was trying to panic-die, it crashed
instead of dying cleanly.

3. If an address was routed using a DNS lookup that found no MX records, but
one or more A records, and fallback hosts were specified on the transport, the
fallback hosts were ignored.

4. $message_body_size was set incorrectly (to zero) during filter testing.

5. Ensure the configuration file is closed before running the -bi command.

6. Reap all complete processes within the loop for accepting -bs or -bS
messages, because it seems that not all OS do this automatically when SIGCHLD
is set to SIG_IGN.

7. Reset SIGHUP to SIG_IGN before restarting a daemon, in case another SIGHUP
arrives very quickly and kills the newly started Exim before it has a chance to
get going.

8. After "452 space shortage", was not unsetting the sender address. Could lead
to strange effects when the client was pipelining.

9. There was no check that getpeername() was giving a socket address when
called on stdin passed from a previous delivery.

10. If a local part beginning with a pipe symbol was directed to a pipe
transport, the transport got confused as to which command it should run.
This could be a security exposure if unchecked local parts are directed
or routed to pipe transports.
2001-12-29 12:55:08 +00:00