31_eximmanpage.dpatch
32_exim4.dpatch
33_eximon.binary.dpatch
34_eximstatsmanpage.dpatch
35_install.dpatch
50_localscan_dlopen.dpatch
60_convert4r4.dpatch
67_unnecessaryCopt.diff
70_remove_exim-users_references.dpatch
fix_smtp_banner.patch
eximstats_unitialized_value.patch
CVE-2019-10149.patch
CVE-2019-13917.patch
CVE-2019-15846.patch
CVE-2020-12783-1.patch
CVE-2020-12783-2.patch
sec-202105/CVE-2020-28020.patch
sec-202105/0001-tidy.patch
sec-202105/0003-Enforce-pid_file_path-start-at.patch
sec-202105/0006-gen_pkcs3-Terminate-string-before-calling-BH_hex2bn.patch
sec-202105/0007-Re-ran-the-conversion-of-all-DH-parameters.patch
sec-202105/0008-SECURITY-length-limits-on-many-cmdline-options.patch
sec-202105/0009-SECURITY-pick-up-more-argv-length-checks.patch
sec-202105/0010-SECURITY-fix-Qualys-CVE-2020-SLCWD.patch
sec-202105/0011-SECURITY-fix-Qualys-CVE-2020-PFPSN.patch
sec-202105/0012-SECURITY-fix-Qualys-CVE-2020-PFPZA.patch
sec-202105/0013-SECURITY-refuse-too-small-store-allocations.patch
sec-202105/0014-SECURITY-a-second-negative-store-guard.patch
sec-202105/0015-SECURITY-default-recipients_max-to-50-000.patch
sec-202105/0016-SECURITY-Avoid-integer-overflow-on-too-many-recipien.patch
sec-202105/0017-SECURITY-fix-SMTP-verb-option-parsing.patch
sec-202105/0018-SECURITY-rework-BDAT-receive-function-handling.patch
sec-202105/0019-Fixes-for-compilation.patch
sec-202105/0020-Inline-four-often-called-new-functions.patch
sec-202105/0022-SECURITY-off-by-one-in-smtp-transport-read-response.patch
sec-202105/0023-SECURITY-Don-t-miss-the-very-last-byte-when-reading-.patch
sec-202105/0024-SECURITY-Fix-safeguard-against-upward-traversal-in-m.patch
sec-202105/0025-SECURITY-Check-overrun-rcpt_count-integer.patch
sec-202105/0026-pre1.patch
sec-202105/0026-SECURITY-Avoid-decrement-of-dkim_collect_input-if-al.patch
sec-202105/0027-SECURITY-Avoid-memory-corruption-in-dkim-handling.patch
sec-202105/0028-SECURITY-Avoid-modification-of-constant-data.patch
sec-202105/0029-SECURITY-smtp_out-Leave-a-clean-input-buffer-even-in.patch
sec-202105/0030-CVE-2020-28019-Failure-to-reset-function-pointer-aft.patch
sec-202105/0031-CVE-2020-28008-Assorted-attacks-in-Exim-s-spool-dire.patch
sec-202105/0032-Add-priv.c-reworked-version-of-priv-dropping-code.patch
sec-202105/0033-CVE-2020-28014-CVE-2021-27216-PID-file-handling.patch
sec-202105/0034-CVE-2020-28025-Heap-out-of-bounds-read-in-pdkim_fini.patch
sec-202105/0035-CVE-2020-28018-Use-after-free-in-tls-openssl.c.patch
sec-202105/0036-CVE-2020-28010-Heap-out-of-bounds-write-in-main.patch
sec-202105/0037-CVE-2020-28011-Heap-buffer-overflow-in-queue_run.patch
sec-202105/0038-CVE-2020-28013-Heap-buffer-overflow-in-parse_fix_phr.patch
sec-202105/0039-SECURITY-Refuse-negative-and-large-store-allocations.patch
sec-202105/0040-CVE-2020-28017-Integer-overflow-in-receive_add_recip.patch
sec-202105/0041-CVE-2020-28022-Heap-out-of-bounds-read-and-write-in-.patch
sec-202105/0042-CVE-2020-28026-Line-truncation-and-injection-in-spoo.patch
sec-202105/0043-CVE-2020-28015-28021-New-line-injection-into-spool-h.patch
sec-202105/0044-CVE-2020-28009-Integer-overflow-in-get_stdinput.patch
sec-202105/0045-CVE-2020-28024-Heap-buffer-underflow-in-smtp_ungetc.patch
sec-202105/0046-CVE-2020-28012-Missing-close-on-exec-flag-for-privil.patch
sec-202105/0047-SECURITY-Always-exit-when-LOG_PANIC_DIE-is-set.patch
sec-202105/0048-SECURITY-Leave-a-clean-smtp_out-input-buffer-even-in.patch
sec-202105/0049-SECURITY-Avoid-modification-of-constant-data-in-dkim.patch
sec-202105/0050-CVE-2020-28016-Heap-out-of-bounds-write-in-parse_fix.patch
sec-202105/0051-CVE-2020-28007-Link-attack-in-Exim-s-log-directory.patch
sec-202105/0053-Remove-merge-artifact.patch
sec-202105/0054-CVE-2020-28023-Out-of-bounds-read-in-smtp_setup_msg.patch
sec-202105/0055-Honour-the-outcome-of-parse_extract_address-testsuit.patch
sec-202105/0056-rewrite-revert-to-unchecked-result-of-parse_extract_.patch
sec-202105/0057-Fix-BDAT-issue-for-body-w-o-trailing-CRLF-again-Bug-.patch
CVE-2022-37452.patch
CVE-2022-3559-1.patch
CVE-2022-3559-2.patch
CVE-2022-3559-3.patch
CVE-2022-3559-4.patch
