aboutsummaryrefslogtreecommitdiffstats
path: root/mail/exim-doc-html
diff options
context:
space:
mode:
authorvsevolod <vsevolod@FreeBSD.org>2014-07-22 23:39:44 +0800
committervsevolod <vsevolod@FreeBSD.org>2014-07-22 23:39:44 +0800
commite0da321c1bd198034dbdf5e91d6aa5a736a5cddb (patch)
tree19bbae85fd6e60f76bc00eb82df6cb57677d18b3 /mail/exim-doc-html
parent6903463f32073f1eb9fa7908246e750e53c96614 (diff)
downloadfreebsd-ports-gnome-e0da321c1bd198034dbdf5e91d6aa5a736a5cddb.tar.gz
freebsd-ports-gnome-e0da321c1bd198034dbdf5e91d6aa5a736a5cddb.tar.zst
freebsd-ports-gnome-e0da321c1bd198034dbdf5e91d6aa5a736a5cddb.zip
Update to 4.83.
Changes in the port: - Added new options: * DNSSEC: validate peers using TLSA records * PRDR: Per-Recipient-Data-Response support * CERTNAMES: Check certiticates ownership * DSN: Delivery Status Notifications * PROXY: Experimental Proxy Protocol - Enable OCSP stapling by default - Disable NIS by default - SRS support is now radio group - DNSSEC and PRDR are now enabled by default Changes in exim itself: This release contains the following enhancements and bugfixes: + PRDR was promoted from Experimental to mainline + OCSP Stapling was promoted from Experimental to mainline + new Experimental feature Proxy Protocol + new Experimental feature DSN (Delivery Status Notifications) + TLS session improvements + TLS SNI fixes + LDAP enhancements + DMARC fixes (previous CVE-2014-2957) and new $dmarc_domain_policy + several new operations (listextract, utf8clean, md5, sha1) + enforce header formatting with verify=header_names_ascii + new commandline option -oMm + new TLSA dns lookup + new malware "sock" type + cutthrough routing enhancements + logging enhancements + DNSSEC enhancements + exiqgrep enhancements + deprecating non-standard SPF results + build and portability fixes + documentation fixes and enhancements Uncompatible changes: This release of Exim includes one incompatible fix: the behavior of expansion of arguments to math comparison functions (<, <=, =, =>, >) was unexpected, expanding the values twice. This fix also addresses a security advisory, CVE-2014-2972. This is not a remote exploit, but if content that is searched by the above math comparison functions is under the control of an attacker, specially crafted data can be inserted that will cause the Exim mail server to perform various file-system functions as the exim user.
Diffstat (limited to 'mail/exim-doc-html')
-rw-r--r--mail/exim-doc-html/Makefile2
-rw-r--r--mail/exim-doc-html/distinfo12
2 files changed, 7 insertions, 7 deletions
diff --git a/mail/exim-doc-html/Makefile b/mail/exim-doc-html/Makefile
index 0e0d651873a3..cdf6fbc01e3d 100644
--- a/mail/exim-doc-html/Makefile
+++ b/mail/exim-doc-html/Makefile
@@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= exim
-PORTVERSION= 4.82.1
+PORTVERSION= 4.83
CATEGORIES= mail
MASTER_SITES= ${MASTER_SITE_EXIM:S/$/:exim/}
MASTER_SITE_SUBDIR= exim4/:exim
diff --git a/mail/exim-doc-html/distinfo b/mail/exim-doc-html/distinfo
index 80f67147bd00..15688c5f2783 100644
--- a/mail/exim-doc-html/distinfo
+++ b/mail/exim-doc-html/distinfo
@@ -1,6 +1,6 @@
-SHA256 (exim/exim-html-4.82.1.tar.bz2) = 81d0237cff64b259d47c758d5c82da93bd2e7b8ce048974d53d90e597eee122e
-SIZE (exim/exim-html-4.82.1.tar.bz2) = 458569
-SHA256 (exim/exim-pdf-4.82.1.tar.bz2) = 2e3705504f22633a14d417ffcb72c6beddc2f142e38ff4f01394b83ae583ff42
-SIZE (exim/exim-pdf-4.82.1.tar.bz2) = 1835284
-SHA256 (exim/exim-postscript-4.82.1.tar.bz2) = f9c69153b1da3ef854c73ac98ec5bcef842438c5630819bc2287dec869bd039d
-SIZE (exim/exim-postscript-4.82.1.tar.bz2) = 1008574
+SHA256 (exim/exim-html-4.83.tar.bz2) = d7b38922f2aedd9eb4db7aa0e1e1c0fcd948777a4c8bac7971eaf4b2959bf0de
+SIZE (exim/exim-html-4.83.tar.bz2) = 464789
+SHA256 (exim/exim-pdf-4.83.tar.bz2) = 478fca2c13fbda403fb0c373dc61e82aa434e7167c0341f24b83195afd294b82
+SIZE (exim/exim-pdf-4.83.tar.bz2) = 1856787
+SHA256 (exim/exim-postscript-4.83.tar.bz2) = 7f8ef825a832debdab54173bfb4e86acaaa6eb139a64e8b87a785183354375cf
+SIZE (exim/exim-postscript-4.83.tar.bz2) = 1019858