mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-13 03:03:15 +00:00
0a629bd710
* New upstream security release. + Release based on +fixes branch. + Fixes multiple security vulnerabilities reported by Qualys and adds related robustness improvements. (Special thanks to Heiko) CVE-2020-28023: Out-of-bounds read in smtp_setup_msg() CVE-2020-28007: Link attack in Exim's log directory CVE-2020-28016: Heap out-of-bounds write in parse_fix_phrase() CVE-2020-28012: Missing close-on-exec flag for privileged pipe CVE-2020-28024: Heap buffer underflow in smtp_ungetc() CVE-2020-28009: Integer overflow in get_stdinput() CVE-2020-28015, CVE-28021: New-line injection into spool header file CVE-2020-28026: Line truncation and injection in spool_read_header() CVE-2020-28022: Heap out-of-bounds read and write in extract_option() CVE-2020-28017: Integer overflow in receive_add_recipient() CVE-2020-28013: Heap buffer overflow in parse_fix_phrase() CVE-2020-28011: Heap buffer overflow in queue_run() CVE-2020-28010: Heap out-of-bounds write in main() CVE-2020-28018: Use-after-free in tls-openssl.c CVE-2020-28025: Heap out-of-bounds read in pdkim_finish_bodyhash() CVE-2020-28014, CVE-2021-27216: PID file handling CVE-2020-28008: Assorted attacks in Exim's spool directory CVE-2020-28019: Failure to reset function pointer after BDAT error * Incorporate debian patches to turn taint failures into warnings. |
||
---|---|---|
.. | ||
debian | ||
150.exim-tidydb.sh | ||
460.exim-mail-rejects.sh | ||
exim.in | ||
extra-patch-Local-sa-exim.c | ||
extra-patch-Local-sa-exim.conf | ||
patch-exim_monitor-em_hdr.h | ||
patch-Makefile | ||
patch-OS__Makefile-Default | ||
patch-OS__Makefile-FreeBSD | ||
patch-OS_os.h-FreeBSD | ||
patch-pass-fd-to-tcpwrappers | ||
patch-scripts__exim_install | ||
patch-src__configure.default | ||
patch-src__EDITME | ||
patch-src-auths-call_radius.c | ||
patch-src-lookups-mysql.c | ||
patch-sys-file-include | ||
POST-INSTALL-NOTES | ||
POST-INSTALL-NOTES.clamd |