summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2021-06-24smtpHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit 8b7d4ba8903ace7e3e3db70343798a5a0b7cea23)
2021-06-24smtp_outHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit b9b967cca71a4da51506f8ba596b9ae40cfcef57)
2021-06-24deliverHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit 2bafe3fc82cf62f0c21f939f5891b8d067f3abc7)
2021-06-24rf_get_transportHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit 015fff57c854184f8bce61476c46a2830a97daf8)
2021-06-24lf_sqlperformHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit 9810dfc25d8b9687b46e57963a3ac30bf5c9b2c9)
2021-06-24expandHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit c02ea85f525ff256d78e084d6f76fe3032fd52e1)
2021-06-24directoryHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit 5f41e800ce9cc7ad154047298914df955e905bf4)
2021-06-24deliverHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit 2fee91ae42e974c21202e0b5e17185f6a87bf8af)
2021-06-24pipeHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit f9628406706112be459adb3f121db8e6cf282c2d)
2021-06-24autoreplyHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit 26de37d8960da80473866fb59b9dfd10a5761538)
2021-06-24rdaHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit a6da9c67acaee699616516be141d600cc178a633)
2021-06-24parseHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit 7eeeb6f26af05322814ecc77c87f09c72ab2216a)
2021-06-24aclHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit 44fd80ad8abcd885fc1c8dbb294fc2140e4ef481)
2021-06-24dbstuffHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit 35b11dd0e52b5ac176849f807cca8898bcaf0c3d)
2021-06-24searchHeiko Schlittermann (HS12-RIPE)
(cherry picked from commit b71d675f695c2cf17357b190476129535d5f446c)
2021-06-24Introduce main config option allow_insecure_tainted_dataHeiko Schlittermann (HS12-RIPE)
This option is deprecated already now. (cherry picked from commit ec06d64532e4952fc36429f73e0222d26997ef7c)
2021-06-22GnuTLS: fix build with older GnuTLSJeremy Harris
The ALPN handling we need requires later features than the basic functions. Broken-byu: f50a063dc0
2021-06-22TLS: as server, reject connections with ALPN indicating non-smtp useJeremy Harris
2021-06-21Compiler quieteningJeremy Harris
Stupid static analysis failing to track crontrol dependencies
2021-06-19OpenSSL: on library versions too old to support session ticketsJeremy Harris
client-side limit the valid lifetime of resumable sessions
2021-06-17OpenSSL: fix verify-certs stack initializationJeremy Harris
2021-06-15hosts_require_heloJeremy Harris
2021-06-08Fix server creds cache invalidationJeremy Harris
Broken-by: 5fd673807d
2021-06-07compiler quieteningJeremy Harris
2021-06-07Re-fix non-Linux buildJeremy Harris
2021-06-06tidyingJeremy Harris
Vroken-by: ef77ddc923
2021-06-06Fix non-Linux buildJeremy Harris
2021-06-06Observability: listen queue backlogJeremy Harris
2021-06-06Avoid rescanning listen select setJeremy Harris
2021-06-06Compute select fd_set outside daemon loopJeremy Harris
2021-06-05Fix SSL creds file watching on kevent platforms (BSDs) for symlinksJeremy Harris
2021-06-04DMARC: note unsupported library versions issueJeremy Harris
2021-06-04debug: fix openssl outputJeremy Harris
2021-06-03DKIM: under GnuTLS, permit weak algorithmsJeremy Harris
Recent versions of GnuTLS by default disallow use of some methods now regarded as weak. This probably mean sha1, which is deprecated per DKIM standards.
2021-05-28tidyingJeremy Harris
2021-05-28tidyingJeremy Harris
2021-05-28Logging: avoid pause during log-open under testsuiteJeremy Harris
It results in rearranged logging output, causing testsuite case failures The downside is that we lose debug visbility of the extra process startup Broken-by: b6c1434e47
2021-05-28Fix dmarc buildJeremy Harris
Broken-by: b6c1434e47
2021-05-27Fix BDAT issue for body w/o trailing CRLF (again Bug 1974)Heiko Schlittermann (HS12-RIPE)
(cherry picked from commit 919111edac911ba9c15422eafd7c5bf14d416d26)
2021-05-27rewrite: revert to unchecked result of parse_extract_address()Heiko Schlittermann (HS12-RIPE)
Now it breaks 471, and overlong addresses won't make it into the rewrite process, as they are handled as empty. (cherry picked from commit 506286c62b8786a926dafb5bb05d3103492b86bc)
2021-05-27Honour the outcome of parse_extract_address(), testsuite 471Heiko Schlittermann (HS12-RIPE)
(cherry picked from commit 39d83bf19fc0c4364e0a665360b14194c62e4ab4)
2021-05-27Update upgrade notes and source about use of seteuid()Heiko Schlittermann (HS12-RIPE)
(cherry picked from commit bc13bbca6e07267dfe0c4d275bb0a2e9aabf1dfb) (cherry picked from commit fee1a06ec05e58e0cda8cf04f28240688736f945)
2021-05-27CVE-2020-28007: Link attack in Exim's log directoryQualys Security Advisory
We patch this vulnerability by opening (instead of just creating) the log file in an unprivileged (exim) child process, and by passing this file descriptor back to the privileged (root) parent process. The two functions log_send_fd() and log_recv_fd() are inspired by OpenSSH's functions mm_send_fd() and mm_receive_fd(); thanks! This patch also fixes: - a NULL-pointer dereference in usr1_handler() (this signal handler is installed before process_log_path is initialized); - a file-descriptor leak in dmarc_write_history_file() (two return paths did not close history_file_fd). Note: the use of log_open_as_exim() in dmarc_write_history_file() should be fine because the documentation explicitly states "Make sure the directory of this file is writable by the user exim runs as." (cherry picked from commit 2502cc41d1d92c1413eca6a4ba035c21162662bd) (cherry picked from commit 93e9a18fbf09deb59bd133986f4c89aeb2d2d86a)
2021-05-27CVE-2020-28016: Heap out-of-bounds write in parse_fix_phrase()Heiko Schlittermann (HS12-RIPE)
Based on Phil Pennock's commit 76a1ce77. Modified by Qualys. (cherry picked from commit f218fef171cbe9e61d10f15399aab8fa6956535b) (cherry picked from commit 8b1e9bc2cac17ee24d595c97dcf97d9b016f8a46)
2021-05-27SECURITY: Avoid modification of constant data in dkim handlingHeiko Schlittermann (HS12-RIPE)
Based on Heiko Schlittermann's commits f880c7f3 and c118c7f4. This fixes: 6/ In src/pdkim/pdkim.c, pdkim_update_ctx_bodyhash() is sometimes called with a global orig_data and hence canon_data, and the following line can therefore modify data that should be constant: 773 canon_data->len = b->bodylength - b->signed_body_bytes; For example, the following proof of concept sets lineending.len to 0 (this should not be possible): (sleep 10; echo 'EHLO test'; sleep 3; echo 'MAIL FROM:<>'; sleep 3; echo 'RCPT TO:postmaster'; sleep 3; echo 'DATA'; date >&2; sleep 30; printf 'DKIM-Signature:a=rsa-sha1;c=simple/simple;l=0\r\n\r\n\r\nXXX\r\n.\r\n'; sleep 30) | nc -n -v 192.168.56.102 25 (gdb) print lineending $1 = {data = 0x55e18035b2ad "\r\n", len = 2} (gdb) print &lineending.len $3 = (size_t *) 0x55e180385948 <lineending+8> (gdb) watch *(size_t *) 0x55e180385948 Hardware watchpoint 1: *(size_t *) 0x55e180385948 Old value = 2 New value = 0 (gdb) print lineending $5 = {data = 0x55e18035b2ad "\r\n", len = 0} (cherry picked from commit 92359a62a0e31734ad8069c66f64b37f9eaaccbe) (cherry picked from commit c5f2f5cf2a6b45ae7ba0ed15e04fbe014727b210)
2021-05-27SECURITY: Leave a clean smtp_out input buffer even in case of read errorHeiko Schlittermann (HS12-RIPE)
Based on Heiko Schlittermann's commit 54895bc3. This fixes: 7/ In src/smtp_out.c, read_response_line(), inblock->ptr is not updated when -1 is returned. This does not seem to have bad consequences, but is maybe not the intended behavior. (cherry picked from commit 30f5d98786fb4e6ccfdd112fe65c153f0ee34c5f) (cherry picked from commit d600f6c4d0c5d33e3988dfbfee248ff6a1536673)
2021-05-27SECURITY: Always exit when LOG_PANIC_DIE is setQualys Security Advisory
(cherry picked from commit e20aa895b37f449d5c81c3e7b102fc534b5d23ba) (cherry picked from commit 3b8c0ceb7339329188e19efb907da950dbe691d1)
2021-05-27CVE-2020-28012: Missing close-on-exec flag for privileged pipeQualys Security Advisory
(cherry picked from commit 72dad1e64bb3d1ff387938f59678098cab1f60a3) (cherry picked from commit 645a31d16195bb6b73f0a0d0c04b2251e5b28421)
2021-05-27CVE-2020-28024: Heap buffer underflow in smtp_ungetc()Qualys Security Advisory
(cherry picked from commit 998e5a9db121c3eff15cac16859bdffd7adcbe57) (cherry picked from commit 638f7ca75694bcbb70cfbe7db2ef52af4aca5c83)
2021-05-27CVE-2020-28009: Integer overflow in get_stdinput()Qualys Security Advisory
(cherry picked from commit bbf1bb10bee5a1d7cbcc97f178b348189219eb7d) (cherry picked from commit 1241deaefb71c40436320af7d0bd04c7c9e54241)