Index | Thread | Search

From:
Stuart Henderson <stu@spacehopper.org>
Subject:
exim
To:
ports <ports@openbsd.org>, renaud@allard.it
Date:
Wed, 15 Apr 2026 11:26:53 +0100

Download raw body.

Thread
  • Stuart Henderson:

    exim

    • Renaud Allard:

      exim

      • renaud@openbsd.org:

        exim

Since we're coming up to release (where we have to maintain it for
another 6 months), I thought I'd revisit this. History of security
issues + setuid root is a terrible combo.

Are there any strong reasons to keep exim in ports?

If not, ok to remove?


----- Forwarded message from Stuart Henderson <stu@spacehopper.org> -----

From: Stuart Henderson <stu@spacehopper.org>
Date: Mon, 19 Aug 2024 15:13:40 +0100
Subject: Re: exim SIGSEGV on TLS connections on latest amd64 snapshot

On 2024/08/19 15:26, Theo Buehler wrote:
<snip>
> While it is impossible to be sure where exactly the bug lies, it sure
> looks as if exim had another pretty bad bug in a release. The diff
> doesn't show much information since it's mostly pointless churn.
> 
> I think it is about time to seriously consider removing exim from the
> ports tree for good.

That would be OK with me. Of course people can still fetch from the
Attic and build themselves if they really need it, but the extra
steps needed for that (+ OS updates) will increase the motivation
to port the config across to another MTA.
<snip>


----- End forwarded message -----


---------------------
PatchSet 215 
Date: 2025/12/18 21:39:26
Author: tb
Branch: HEAD
Tag: (none) 
Log:
Security update to exim 4.99.1 from maintainer

1. Incomplete SQL injection fix - CVE-2025-26794's patch doesn't escape single quotes
2. Heap buffer overflow - Unvalidated database field used as array bound (NEW)
https://code.exim.org/exim/exim/src/commit/d46a6727798fc48d1756190a6d46d19216348c25/doc/doc-txt/exim-security-2025-12-09.1/report.txt

Is it finally time to take this behind the barn?

Members: 
	Makefile:1.156->1.157 
	distinfo:1.52->1.53 

---------------------