summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* Fix SSL creds file watching on kevent platforms (BSDs) for symlinksJeremy Harris2021-06-051-7/+10
* DMARC: note unsupported library versions issueJeremy Harris2021-06-042-0/+7
* debug: fix openssl outputJeremy Harris2021-06-044-17/+24
* Testsuite: regen certificates suite with fixed Authority IdentifierJeremy Harris2021-06-04515-4594/+4782
* DKIM: under GnuTLS, permit weak algorithmsJeremy Harris2021-06-031-1/+2
* Testsuite: use higher-spec certs, for more-recent GnuTLS versions which depre...Jeremy Harris2021-06-0322-91/+59
* tidyingJeremy Harris2021-05-281-19/+13
* Update testcase output to match newly applied default config limitJeremy Harris2021-05-281-4/+4
* Fix testsuite output for DB casesJeremy Harris2021-05-286-6/+0
* tidyingJeremy Harris2021-05-281-30/+24
* Logging: avoid pause during log-open under testsuiteJeremy Harris2021-05-281-1/+1
* Fix dmarc buildJeremy Harris2021-05-282-2/+2
* Docs: enhance section on redirect router :defer: & :fail:Jeremy Harris2021-05-281-1/+1
* Merge branch 'qualys-2020'Heiko Schlittermann (HS12-RIPE)2021-05-2775-696/+1473
|\
| * Fix BDAT issue for body w/o trailing CRLF (again Bug 1974)Heiko Schlittermann (HS12-RIPE)2021-05-271-0/+1
| * testsuite: reproduce BDAT with missing eol (Bug 1974)Heiko Schlittermann (HS12-RIPE)2021-05-273-10/+73
| * Cleanup docs on cve-2020-qualys, point to the Exim websiteHeiko Schlittermann (HS12-RIPE)2021-05-271-0/+2
| * rewrite: revert to unchecked result of parse_extract_address()Heiko Schlittermann (HS12-RIPE)2021-05-271-1/+17
| * Honour the outcome of parse_extract_address(), testsuite 471Heiko Schlittermann (HS12-RIPE)2021-05-276-16/+110
| * Update upgrade notes and source about use of seteuid()Heiko Schlittermann (HS12-RIPE)2021-05-272-10/+14
| * CVE-2020-28007: Link attack in Exim's log directoryQualys Security Advisory2021-05-275-97/+146
| * CVE-2020-28016: Heap out-of-bounds write in parse_fix_phrase()Heiko Schlittermann (HS12-RIPE)2021-05-271-3/+3
| * SECURITY: Avoid modification of constant data in dkim handlingHeiko Schlittermann (HS12-RIPE)2021-05-271-5/+5
| * SECURITY: Leave a clean smtp_out input buffer even in case of read errorHeiko Schlittermann (HS12-RIPE)2021-05-271-1/+2
| * SECURITY: Always exit when LOG_PANIC_DIE is setQualys Security Advisory2021-05-272-0/+5
| * CVE-2020-28012: Missing close-on-exec flag for privileged pipeQualys Security Advisory2021-05-272-0/+8
| * CVE-2020-28024: Heap buffer underflow in smtp_ungetc()Qualys Security Advisory2021-05-272-0/+6
| * CVE-2020-28009: Integer overflow in get_stdinput()Qualys Security Advisory2021-05-271-1/+18
| * CVE-2020-28015+28021: New-line injection into spool header fileQualys Security Advisory2021-05-271-5/+18
| * CVE-2020-28026: Line truncation and injection in spool_read_header()Heiko Schlittermann (HS12-RIPE)2021-05-271-16/+32
| * CVE-2020-28022: Heap out-of-bounds read and write in extract_option()Heiko Schlittermann (HS12-RIPE)2021-05-271-9/+14
| * CVE-2020-28017: Integer overflow in receive_add_recipient()Heiko Schlittermann (HS12-RIPE)2021-05-271-6/+6
| * SECURITY: Refuse negative and large store allocationsHeiko Schlittermann (HS12-RIPE)2021-05-271-6/+12
| * CVE-2020-28013: Heap buffer overflow in parse_fix_phrase()Heiko Schlittermann (HS12-RIPE)2021-05-271-6/+1
| * CVE-2020-28011: Heap buffer overflow in queue_run()Qualys Security Advisory2021-05-271-4/+10
| * CVE-2020-28010: Heap out-of-bounds write in main()Heiko Schlittermann (HS12-RIPE)2021-05-271-6/+3
| * CVE-2020-28018: Use-after-free in tls-openssl.cQualys Security Advisory2021-05-271-4/+0
| * CVE-2020-28025: Heap out-of-bounds read in pdkim_finish_bodyhash()Qualys Security Advisory2021-05-271-1/+1
| * CVE-2020-28014, CVE-2021-27216: PID file handlingHeiko Schlittermann (HS12-RIPE)2021-05-274-47/+149
| * Add priv.c: reworked version of priv dropping codeHeiko Schlittermann (HS12-RIPE)2021-05-2714-73/+81
| * CVE-2020-28008: Assorted attacks in Exim's spool directoryHeiko Schlittermann (HS12-RIPE)2021-05-272-51/+68
| * CVE-2020-28019: Failure to reset function pointer after BDAT errorJeremy Harris2021-05-271-1/+14
| * SECURITY: smtp_out: Leave a clean input buffer, even in case of read errorHeiko Schlittermann (HS12-RIPE)2021-05-271-2/+3
| * SECURITY: Avoid modification of constant dataHeiko Schlittermann (HS12-RIPE)2021-05-271-8/+9
| * SECURITY: Avoid memory corruption in dkim handlingHeiko Schlittermann (HS12-RIPE)2021-05-271-6/+8
| * SECURITY: Avoid decrement of dkim_collect_input if already at 0Heiko Schlittermann (HS12-RIPE)2021-05-271-1/+1
| * SECURITY: Check overrun rcpt_count integerHeiko Schlittermann (HS12-RIPE)2021-05-271-1/+5
| * SECURITY: Fix safeguard against upward traversal in msglog files.Heiko Schlittermann (HS12-RIPE)2021-05-272-1/+3
| * SECURITY: Don't miss the very last byte when reading long lines from -HHeiko Schlittermann (HS12-RIPE)2021-05-271-1/+1
| * SECURITY: off-by-one in smtp transport (read response)Heiko Schlittermann (HS12-RIPE)2021-05-271-2/+2