Name: | exim-greylist |
---|---|
Version: | 4.89 |
Release: | 4.el7 |
Architecture: | x86_64 |
Group: | System Environment/Daemons |
Size: | 6502 |
License: | GPLv2+ |
RPM: | exim-greylist-4.89-4.el7.x86_64.rpm |
Source RPM: | exim-4.89-4.el7.src.rpm |
Build Date: | Wed Jan 24 2018 |
Build Host: | x86-ol6-builder-02.us.oracle.com |
Vendor: | Oracle America |
URL: | http://www.exim.org/ |
Summary: | Example configuration for greylisting using Exim |
Description: | This package contains a simple example of how to do greylisting in Exim's ACL configuration. It contains a cron job to remove old entries from the greylisting database, and an ACL subroutine which needs to be included from the main exim.conf file. To enable greylisting, install this package and then uncomment the lines in Exim's configuration /etc/exim.conf which enable it. You need to uncomment at least two lines -- the '.include' directive which includes the new ACL subroutine, and the line which invokes the new subroutine. By default, this implementation only greylists mails which appears 'suspicious' in some way. During normal processing of the ACLs we collect a list of 'offended' which it's committed, which may include having SpamAssassin points, lacking a Message-ID: header, coming from a blacklisted host, etc. There are examples of these in the default configuration file, mostly commented out. These should be sufficient for you to you trigger greylisting for whatever 'offences' you can dream of, or even to make greylisting unconditional. |
- Fixed denial of service Resolves: CVE-2017-16944
- Fixed use-after-free Resolves: CVE-2017-16943
- Fixed compilation with the mariadb-10.2 Resolves: rhbz#1467312 - Fixed multiple memory leaks Resolves: CVE-2017-1000369 - Fixed typo causing exim-clamav to create /0750 directory Resolves: rhbz#1412028 - On callout avoid SIZE option when doing recipient verification with caching enabled Resolves: rhbz#1482217 - Fixed some minor whitespace problems in the spec
- New version Resolves: rhbz#1428141 - Switched to xz archive - Dropped DKIM-fix patch (already upstream)
- Fixed DKIM - Defuzzified patches and fixed some whitespaces
- Fixed changelog and sources
- New version - Fixed DKIM private key leakage Resolves: CVE-2016-9963
- Used sane environment defaults in default configuration Resolves: rhbz#1323775
- New version (security bug fix release) Resolves: rhbz#1314118 - Fixed local privilege escalation for set-uid root when using perl_startup Resolves: CVE-2016-1531 - Defuzzified patches
- MIME crash fix (by mime-fix patch) Resolves: rhbz#1289056