Revisions of exim
- update to 4.97.1 (bsc#1218387, CVE-2023-51766): * Fixes for the smtp protocol smuggling (CVE-2023-51766) passed over a connection could use BDAT; any further ones using DATA. proxy. - Update eximstats-html-update.py to run under Python 3. * CVE-2019-13917: Fixed an issue with ${sort} expansion which could allow remote attackers to execute other programs with root privileges - Replace xorg-x11-devel by individual pkgconfig() buildrequires. - Replace references to /var/adm/fillup-templates with new + fix CVE-2016-1531 argument.
- update to exim 4.97 * remove patch-no-exit-on-rewrite-malformed-address.patch (upstreamed)
- security update to exim 4.96.2 * fixes CVE-2023-42117 (bsc#1215787) * fixes CVE-2023-42119 (bsc#1215789)
- security update to exim 4.96.1 * fixes CVE-2023-42114 (bsc#1215784) * fixes CVE-2023-42115 (bsc#1215785) * fixes CVE-2023-42116 (bsc#1215786)
Automatic submission by obs-autosubmit
- add patch-cve-2022-3559 (fixes CVE-2022-3559, bsc#1204427, Bug 2915)
- add (patch-no-exit-on-rewrite-malformed-address.patch) Fix exit on attempt to rewrite a malformed address (Bug 2903) - Own /var/spool/mail (boo#1179574) - Migration to /usr/etc: Saving user changed configuration files in /etc and restoring them while an RPM update.
- disable ProtectHome=, it prevents local delivery (bsc#1194810)
- update to exim 4.94 * some transports now refuse to use tainted data in constructing their delivery location this WILL BREAK configurations which are not updated accordingly. In particular: any Transport use of $local_user which has been relying upon check_local_user far away in the Router to make it safe, should be updated to replace $local_user with $local_part_data. * Attempting to remove, in router or transport, a header name that ends with an asterisk (which is a standards-legal name) will now result in all headers named starting with the string before the asterisk being removed.
Displaying revisions 1 - 20 of 80