Revisions of exim
Ana Guerrero (anag+factory)
accepted
request 1187596
from
Dirk Mueller (dirkmueller)
(revision 81)
- update to 4.98 (bsc#1227423, CVE-2024-39929): * The dkim_status ACL condition may now be used in data ACLs * The dkim_verbose logging control also enables logging of signing * The dkim_timestamps signing option now accepts zero to include a current timestamp but no expiry timestamp. * The recipients_max main option is now expanded. * Setting variables for "exim -be" can set a tainted value. * A dns:fail event. * The dsearch lookup supports search for a sub-path. * Include mailtest utility for simple connection checking. * Add SMTP WELLKNOWN extension.
Dominique Leuenberger (dimstar_suse)
accepted
request 1135763
from
Dirk Mueller (dirkmueller)
(revision 79)
- update to 4.97.1 (bsc#1218387, CVE-2023-51766): * Fixes for the smtp protocol smuggling (CVE-2023-51766) passed over a connection could use BDAT; any further ones using DATA. proxy. - Update eximstats-html-update.py to run under Python 3. * CVE-2019-13917: Fixed an issue with ${sort} expansion which could allow remote attackers to execute other programs with root privileges - Replace xorg-x11-devel by individual pkgconfig() buildrequires. - Replace references to /var/adm/fillup-templates with new + fix CVE-2016-1531 argument.
Ana Guerrero (anag+factory)
accepted
request 1123800
from
Peter Wullinger (pwcau)
(revision 78)
- update to exim 4.97 * remove patch-no-exit-on-rewrite-malformed-address.patch (upstreamed)
Ana Guerrero (anag+factory)
accepted
request 1117952
from
Peter Wullinger (pwcau)
(revision 77)
- security update to exim 4.96.2 * fixes CVE-2023-42117 (bsc#1215787) * fixes CVE-2023-42119 (bsc#1215789)
Ana Guerrero (anag+factory)
accepted
request 1114826
from
Peter Wullinger (pwcau)
(revision 76)
- security update to exim 4.96.1 * fixes CVE-2023-42114 (bsc#1215784) * fixes CVE-2023-42115 (bsc#1215785) * fixes CVE-2023-42116 (bsc#1215786)
Dominique Leuenberger (dimstar_suse)
accepted
request 1077219
from
Factory Maintainer (factory-maintainer)
(revision 75)
Automatic submission by obs-autosubmit
Dominique Leuenberger (dimstar_suse)
accepted
request 1062004
from
Peter Wullinger (pwcau)
(revision 74)
Dominique Leuenberger (dimstar_suse)
accepted
request 1029728
from
Peter Wullinger (pwcau)
(revision 73)
- add patch-cve-2022-3559 (fixes CVE-2022-3559, bsc#1204427, Bug 2915)
Richard Brown (RBrownFactory)
accepted
request 1006967
from
Peter Wullinger (pwcau)
(revision 72)
- add (patch-no-exit-on-rewrite-malformed-address.patch) Fix exit on attempt to rewrite a malformed address (Bug 2903) - Own /var/spool/mail (boo#1179574) - Migration to /usr/etc: Saving user changed configuration files in /etc and restoring them while an RPM update.
Dominique Leuenberger (dimstar_suse)
accepted
request 985854
from
Peter Wullinger (pwcau)
(revision 71)
Dominique Leuenberger (dimstar_suse)
accepted
request 947395
from
Peter Wullinger (pwcau)
(revision 70)
- disable ProtectHome=, it prevents local delivery (bsc#1194810)
Dominique Leuenberger (dimstar_suse)
accepted
request 922122
from
Peter Wullinger (pwcau)
(revision 69)
Dominique Leuenberger (dimstar_suse)
accepted
request 918956
from
Peter Wullinger (pwcau)
(revision 68)
Dominique Leuenberger (dimstar_suse)
accepted
request 906449
from
Dirk Mueller (dirkmueller)
(revision 67)
Dominique Leuenberger (dimstar_suse)
accepted
request 893769
from
Peter Wullinger (pwcau)
(revision 66)
Dominique Leuenberger (dimstar_suse)
accepted
request 890644
from
Peter Wullinger (pwcau)
(revision 65)
Dominique Leuenberger (dimstar_suse)
accepted
request 828909
from
Peter Wullinger (pwcau)
(revision 64)
Dominique Leuenberger (dimstar_suse)
accepted
request 812519
from
Peter Wullinger (pwcau)
(revision 63)
Dominique Leuenberger (dimstar_suse)
accepted
request 810991
from
Peter Wullinger (pwcau)
(revision 62)
- update to exim 4.94 * some transports now refuse to use tainted data in constructing their delivery location this WILL BREAK configurations which are not updated accordingly. In particular: any Transport use of $local_user which has been relying upon check_local_user far away in the Router to make it safe, should be updated to replace $local_user with $local_part_data. * Attempting to remove, in router or transport, a header name that ends with an asterisk (which is a standards-legal name) will now result in all headers named starting with the string before the asterisk being removed.
Displaying revisions 1 - 20 of 81