180 Commits

Author SHA256 Message Date
Peter Wullinger
6f2b538413 spec file cleanup to make update work
- add docdir to spec

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=223
2020-01-02 07:42:12 +00:00
Ismail Dönmez
8edd6a36f1 Accepting request 759172 from home:namtrac:branches:server:mail
Fix changes file (missing header), run format_spec_file
Since the changes are minimal and non-functional I didn't add extra changelog

OBS-URL: https://build.opensuse.org/request/show/759172
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=221
2019-12-29 15:43:33 +00:00
Peter Wullinger
5c6c74edd1 remove duplicate changelog entry
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=220
2019-12-18 07:03:11 +00:00
Lars Vogdt
c3c45b8508 Accepting request 756081 from home:pwcau:branches:server:mail
- update to exim 4.93
  * SUPPORT_DMARC replaces EXPERIMENTAL_DMARC
  * DISABLE_TLS replaces SUPPORT_TLS
  * Bump the version for the local_scan API.
  * smtp transport option hosts_try_fastopen defaults to "*".
  * DNSSec is requested (not required) for all queries. (This seemes to
    ask for trouble if your resolver is a systemd-resolved.)
  * Generic router option retry_use_local_part defaults to "true" under specific
    pre-conditions.
  * Introduce a tainting mechanism for values read from untrusted sources.
  * Use longer file names for temporary spool files (this avoids
    name conflicts with spool on a shared file system).
  * Use dsn_from main config option (was ignored previously).

OBS-URL: https://build.opensuse.org/request/show/756081
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=219
2019-12-17 21:25:57 +00:00
3d30250926 Accepting request 734049 from home:pwcau:branches:server:mail
- update to exim 4.92.3
  * CVE-2019-16928 Heap-based buffer overflow in string_vformat,
    remote code execution seems to be possible

OBS-URL: https://build.opensuse.org/request/show/734049
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=218
2019-10-01 10:49:51 +00:00
Peter Poeml
4f052de71e - update to exim 4.92.3
* CVE-2019-16928: fix against Heap-based buffer overflow in string_vformat,
    remote code execution seems to be possible

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=217
2019-09-30 15:41:24 +00:00
64cccf5ce7 OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=215 2019-09-11 13:54:59 +00:00
Peter Poeml
221a1e1a2f - update to exim 4.92.2
* CVE-2019-15846: fix against remote attackers executing arbitrary code as
    root via a trailing backslash

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=214
2019-09-07 18:25:29 +00:00
4e1beab9c5 Accepting request 718574 from home:atopt:branches:server:mail
- update to exim 4.92.1
 * CVE-2019-13917: Fixed an issue with ${sort} expansion which could 
   allow remote attackers to execute other programs with root privileges 
   (boo#1142207)

OBS-URL: https://build.opensuse.org/request/show/718574
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=212
2019-07-25 17:09:32 +00:00
Lars Vogdt
fb03fe10ba Accepting request 707697 from home:pwcau:branches:server:mail
- spec file cleanup
 * fix DANE inclusion guard condition
 * re-enable i18n and remove misleading comment
 * EXPERIMENTAL_SPF is now SUPPORT_SPF
 * DANE is now SUPPORT_DANE

OBS-URL: https://build.opensuse.org/request/show/707697
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=210
2019-06-08 17:03:13 +00:00
Lars Vogdt
70311798f6 Accepting request 707870 from home:rfrohl:branches:server:mail
add new CVE/bug reference

OBS-URL: https://build.opensuse.org/request/show/707870
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=208
2019-06-05 23:06:41 +00:00
5d10e57e5a Accepting request 687828 from home:seanlew:branches:server:mail
Update exim

OBS-URL: https://build.opensuse.org/request/show/687828
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=206
2019-03-23 19:33:03 +00:00
e824b0d25f Accepting request 675339 from home:pwcau:branches:server:mail
- update to exim 4.92
 * ${l_header:<name>} expansion
 * ${readsocket} now supports TLS
 * "utf8_downconvert" option (if built with SUPPORT_I18N)
 * "pipelining" log_selector
 * JSON variants for ${extract } expansion
 * "noutf8" debug option
 * TCP Fast Open support on MacOS
- add workaround patch for compile time error on missing printf
  format annotation (gnu_printf.patch)

OBS-URL: https://build.opensuse.org/request/show/675339
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=205
2019-02-18 09:04:39 +00:00
e5a07ffaf7 Accepting request 597094 from home:pwcau:branches:server:mail
update to 4.91.

Note that this removes two, previously deprecated SPF ACL conditions (err_temp and err_perm).

OBS-URL: https://build.opensuse.org/request/show/597094
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=203
2018-05-02 15:09:25 +00:00
3bb5245254 Accepting request 587627 from home:elvigia:branches:server:mail
- Replace xorg-x11-devel by individual pkgconfig() buildrequires.

OBS-URL: https://build.opensuse.org/request/show/587627
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=202
2018-03-20 10:29:00 +00:00
1b59343493 Accepting request 576288 from home:kbabioch:branches:server:mail
- update to 4.90.1
  * Allow PKG_CONFIG_PATH to be set in Local/Makefile and use it correctly
    during configuration.  Wildcards are allowed and expanded.
  * Shorten the log line for daemon startup by collapsing adjacent sets of
    identical IP addresses on different listening ports.  Will also affect
    "exiwhat" output.
  * Tighten up the checking in isip4 (et al): dotted-quad components larger
    than 255 are no longer allowed.
  * Default openssl_options to include +no_ticket, to reduce load on peers.
    Disable the session-cache too, which might reduce our load.  Since we
    currrectly use a new context for every connection, both as server and
    client, there is no benefit for these.
  * Add $SOURCE_DATE_EPOCH support for reproducible builds, per spec at
    <https://reproducible-builds.org/specs/source-date-epoch/>.
  * Fix smtp transport use of limited max_rcpt under mua_wrapper. Previously
    the check for any unsuccessful recipients did not notice the limit, and
    erroneously found still-pending ones.
  * Pipeline CHUNKING command and data together, on kernels that support
    MSG_MORE.  Only in-clear (not on TLS connections).
  * Avoid using a temporary file during transport using dkim.  Unless a
    transport-filter is involved we can buffer the headers in memory for
    creating the signature, and read the spool data file once for the
    signature and again for transmission.
  * Enable use of sendfile in Linux builds as default.  It was disabled in
    4.77 as the kernel support then wasn't solid, having issues in 64bit
    mode.  Now, it's been long enough.  Add support for FreeBSD also.
  * Add commandline_checks_require_admin option.
  * Do pipelining under TLS.
  * For the "sock" variant of the malware scanner interface, accept an empty
    cmdline element to get the documented default one.  Previously it was
    inaccessible.
  * Prevent repeated use of -p/-oMr
  * DKIM: enforce the DNS pubkey record "h" permitted-hashes optional field,
    if present.
  * DKIM: when a message has multiple signatures matching an identity given
    in dkim_verify_signers, run the dkim acl once for each.
  * Support IDNA2008.
  * The path option on a pipe transport is now expanded before use
  * Have the EHLO response advertise VRFY, if there is a vrfy ACL defined.
- Several bug fixes
- Fix for buffer overflow in base64decode() (bsc#1079832 CVE-2018-6789)
- removed patches (included upstream now):
  * exim-CVE-2017-1000369.patch
  * exim-CVE-2017-16943.patch
  * exim-CVE-2017-16944.patch
  * exim-4.86.2-mariadb_102_compile_fix.patch

old: server:mail/exim
new: home:kbabioch:branches:server:mail/exim rev None
Index: exim.changes
===================================================================
--- exim.changes (revision 200)
+++ exim.changes (revision 4)
@@ -1,4 +1,54 @@
 -------------------------------------------------------------------
+Tue Feb 13 13:39:34 UTC 2018 - kbabioch@suse.com
+
+- update to 4.90.1
+  * Allow PKG_CONFIG_PATH to be set in Local/Makefile and use it correctly
+    during configuration.  Wildcards are allowed and expanded.
+  * Shorten the log line for daemon startup by collapsing adjacent sets of
+    identical IP addresses on different listening ports.  Will also affect
+    "exiwhat" output.
+  * Tighten up the checking in isip4 (et al): dotted-quad components larger
+    than 255 are no longer allowed.
+  * Default openssl_options to include +no_ticket, to reduce load on peers.
+    Disable the session-cache too, which might reduce our load.  Since we
+    currrectly use a new context for every connection, both as server and
+    client, there is no benefit for these.
+  * Add $SOURCE_DATE_EPOCH support for reproducible builds, per spec at
+    <https://reproducible-builds.org/specs/source-date-epoch/>.
+  * Fix smtp transport use of limited max_rcpt under mua_wrapper. Previously
+    the check for any unsuccessful recipients did not notice the limit, and
+    erroneously found still-pending ones.
+  * Pipeline CHUNKING command and data together, on kernels that support
+    MSG_MORE.  Only in-clear (not on TLS connections).
+  * Avoid using a temporary file during transport using dkim.  Unless a
+    transport-filter is involved we can buffer the headers in memory for
+    creating the signature, and read the spool data file once for the
+    signature and again for transmission.
+  * Enable use of sendfile in Linux builds as default.  It was disabled in
+    4.77 as the kernel support then wasn't solid, having issues in 64bit
+    mode.  Now, it's been long enough.  Add support for FreeBSD also.
+  * Add commandline_checks_require_admin option.
+  * Do pipelining under TLS.
+  * For the "sock" variant of the malware scanner interface, accept an empty
+    cmdline element to get the documented default one.  Previously it was
+    inaccessible.
+  * Prevent repeated use of -p/-oMr
+  * DKIM: enforce the DNS pubkey record "h" permitted-hashes optional field,
+    if present.
+  * DKIM: when a message has multiple signatures matching an identity given
+    in dkim_verify_signers, run the dkim acl once for each.
+  * Support IDNA2008.
+  * The path option on a pipe transport is now expanded before use
+  * Have the EHLO response advertise VRFY, if there is a vrfy ACL defined.
+- Several bug fixes
+- Fix for buffer overflow in base64decode() (bsc#1079832 CVE-2018-6789)
+- removed patches (included upstream now):
+  * exim-CVE-2017-1000369.patch
+  * exim-CVE-2017-16943.patch
+  * exim-CVE-2017-16944.patch
+  * exim-4.86.2-mariadb_102_compile_fix.patch
+
+-------------------------------------------------------------------
 Thu Nov 30 08:32:50 UTC 2017 - wullinger@rz.uni-kiel.de
 
 - add exim-CVE-2017-16944.patch:
Index: exim.spec
===================================================================
--- exim.spec (revision 200)
+++ exim.spec (revision 4)
@@ -1,7 +1,7 @@
 #
 # spec file for package exim
 #
-# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -78,7 +78,7 @@
 %endif
 Requires(pre):  fileutils textutils
 %endif
-Version:        4.88
+Version:        4.90.1
 Release:        0
 %if %{with_mysql}
 BuildRequires:  mysql-devel
@@ -93,8 +93,8 @@
 License:        GPL-2.0+
 Group:          Productivity/Networking/Email/Servers
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
-Source:         http://ftp.exim.org/pub/exim/exim4/old/exim-%{version}.tar.bz2
-Source3:        http://ftp.exim.org/pub/exim/exim4/old/exim-%{version}.tar.bz2.asc
+Source:         http://ftp.exim.org/pub/exim/exim4/exim-%{version}.tar.bz2
+Source3:        http://ftp.exim.org/pub/exim/exim4/exim-%{version}.tar.bz2.asc
 # http://ftp.exim.org/pub/exim/Exim-Maintainers-Keyring.asc
 Source4:        exim.keyring
 Source1:        sysconfig.exim
@@ -107,10 +107,6 @@
 Source32:       eximstats.conf-2.2
 Source40:       exim.service
 Patch0:         exim-tail.patch
-Patch3:         exim-CVE-2017-1000369.patch
-Patch4:         exim-CVE-2017-16943.patch
-Patch5:         exim-CVE-2017-16944.patch
-Patch6:         exim-4.86.2-mariadb_102_compile_fix.patch
 
 %package -n eximon
 Summary:        Eximon, an graphical frontend to administer Exim's mail queue
@@ -153,10 +149,6 @@
 %prep
 %setup -q -n exim-%{version}
 %patch0
-%patch3 -p 1
-%patch4 -p 1
-%patch5 -p 1
-%patch6 -p 1
 # build with fPIE/pie on SUSE 10.0 or newer, or on any other platform
 %if %{?suse_version:%suse_version}%{?!suse_version:99999} > 930
 fPIE="-fPIE"
@@ -328,7 +320,7 @@
 	inst_info=$RPM_BUILD_ROOT/%{_infodir} \
 	INSTALL_ARG=-no_chown 	install
 #mv $RPM_BUILD_ROOT/usr/sbin/exim-%{version}* $RPM_BUILD_ROOT/usr/sbin/exim
-mv $RPM_BUILD_ROOT/usr/sbin/exim-4.8* $RPM_BUILD_ROOT/usr/sbin/exim
+mv $RPM_BUILD_ROOT/usr/sbin/exim-4.9* $RPM_BUILD_ROOT/usr/sbin/exim
 mv $RPM_BUILD_ROOT/etc/exim/exim.conf src/configure.default # with all substitutions done
 %if 0%{?suse_version} > 1220
 install -m 0644 %{S:40} $RPM_BUILD_ROOT/%{_unitdir}/exim.service
Index: exim-4.90.1.tar.bz2
===================================================================
Binary file exim-4.90.1.tar.bz2 (revision 4) added
Index: exim-4.90.1.tar.bz2.asc
===================================================================
--- exim-4.90.1.tar.bz2.asc (added)
+++ exim-4.90.1.tar.bz2.asc (revision 4)
@@ -0,0 +1,11 @@
+-----BEGIN PGP SIGNATURE-----
+
+iQEzBAABCgAdFiEE0L/WueylaUpvFJ3Or0zGdqa2wUIFAlp8U0MACgkQr0zGdqa2
+wUKEiwf9GmNYK5sbmpi/c2TdfPqsqU1o76l3PoTt+kxSQi5t4j30dsqZdWvzvkuj
+k+/x1SsDRg44+wv19ynnYH4tSCZ3QSwTevyfXvR7bSGpSTCN0tTnaWm/AuBXNC8D
+9lukQckwdZckVNciRriVCLi9VTymV/tdnIxowQu/WfdEzFTXDeYzu3KoioG+jKAV
+MWhnyUDfhPYPYs+u8IKdFDE3Z9bO/I/EbgTHiR6PetLWusSugrp/MyJjICp8HsvI
+f/pMj+rytJo2hOnI9x/wpUiXb7XnnQnph3mic5BQU4DF+tI6dK1zTS66PyTYAoNI
+p6Po3uLY/umKYT+W6jxURPfC2TH1+A==
+=k4cD
+-----END PGP SIGNATURE-----
Index: exim-4.86.2-mariadb_102_compile_fix.patch
===================================================================
--- exim-4.86.2-mariadb_102_compile_fix.patch (revision 200)
+++ exim-4.86.2-mariadb_102_compile_fix.patch (deleted)
@@ -1,94 +0,0 @@
-Index: exim-4.86.2/src/lookups/mysql.c
-===================================================================
---- exim-4.86.2.orig/src/lookups/mysql.c
-+++ exim-4.86.2/src/lookups/mysql.c
-@@ -14,6 +14,53 @@ functions. */
- 
- #include <mysql.h>       /* The system header */
- 
-+/* We define symbols for *_VERSION_ID (numeric), *_VERSION_STR (char*)
-+and *_BASE_STR (char*). It's a bit of guesswork. Especially for mariadb
-+with versions before 10.2, as they do not define there there specific symbols.
-+*/
-+
-+// Newer (>= 10.2) MariaDB
-+#if defined                   MARIADB_VERSION_ID
-+#define EXIM_MxSQL_VERSION_ID MARIADB_VERSION_ID
-+
-+// MySQL defines MYSQL_VERSION_ID, and MariaDB does so
-+// https://dev.mysql.com/doc/refman/5.7/en/c-api-server-client-versions.html
-+#elif defined                 LIBMYSQL_VERSION_ID
-+#define EXIM_MxSQL_VERSION_ID LIBMYSQL_VERSION_ID
-+#elif defined                 MYSQL_VERSION_ID
-+#define EXIM_MxSQL_VERSION_ID MYSQL_VERSION_ID
-+
-+#else
-+#define EXIM_MYSQL_VERSION_ID  0
-+#endif
-+
-+// Newer (>= 10.2) MariaDB
-+#ifdef                         MARIADB_CLIENT_VERSION_STR
-+#define EXIM_MxSQL_VERSION_STR MARIADB_CLIENT_VERSION_STR
-+
-+// Mysql uses MYSQL_SERVER_VERSION
-+#elif defined                  LIBMYSQL_VERSION
-+#define EXIM_MxSQL_VERSION_STR LIBMYSQL_VERSION
-+#elif defined                  MYSQL_SERVER_VERSION
-+#define EXIM_MxSQL_VERSION_STR MYSQL_SERVER_VERSION
-+
-+#else
-+#define EXIM_MxSQL_VERSION_STR  "N.A."
-+#endif
-+
-+#if defined                 MARIADB_BASE_VERSION
-+#define EXIM_MxSQL_BASE_STR MARIADB_BASE_VERSION
-+
-+#elif defined               MARIADB_PACKAGE_VERSION
-+#define EXIM_MxSQL_BASE_STR "mariadb"
-+
-+#elif defined               MYSQL_BASE_VERSION
-+#define EXIM_MxSQL_BASE_STR MYSQL_BASE_VERSION
-+
-+#else
-+#define EXIM_MxSQL_BASE_STR  "n.A."
-+#endif
-+
- 
- /* Structure and anchor for caching connections. */
- 
-@@ -423,10 +470,10 @@ return quoted;
- void
- mysql_version_report(FILE *f)
- {
--fprintf(f, "Library version: MySQL: Compile: %s [%s]\n"
--           "                        Runtime: %s\n",
--        MYSQL_SERVER_VERSION, MYSQL_COMPILATION_COMMENT,
--        mysql_get_client_info());
-+fprintf(f, "Library version: MySQL: Compile: %lu %s [%s]\n"
-+           "                        Runtime: %lu %s\n",
-+        (long)EXIM_MxSQL_VERSION_ID, EXIM_MxSQL_VERSION_STR, EXIM_MxSQL_BASE_STR,
-+        mysql_get_client_version(), mysql_get_client_info());
- #ifdef DYNLOOKUP
- fprintf(f, "                        Exim version %s\n", EXIM_VERSION_STR);
- #endif
-Index: exim-4.86.2/src/EDITME
-===================================================================
---- exim-4.86.2.orig/src/EDITME
-+++ exim-4.86.2/src/EDITME
-@@ -253,7 +253,7 @@ TRANSPORT_SMTP=yes
- # you perform upgrades and revert them. You should consider the benefit of
- # embedding the Exim version number into LOOKUP_MODULE_DIR, so that you can
- # maintain two concurrent sets of modules.
--# 
-+#
- # *BEWARE*: ability to modify the files in LOOKUP_MODULE_DIR is equivalent to
- # the ability to modify the Exim binary, which is often setuid root!  The Exim
- # developers only intend this functionality be used by OS software packagers
-@@ -301,6 +301,7 @@ LOOKUP_DNSDB=yes
- # LOOKUP_IBASE=yes
- # LOOKUP_LDAP=yes
- # LOOKUP_MYSQL=yes
-+# LOOKUP_MYSQL_PC=mariadb
- # LOOKUP_NIS=yes
- # LOOKUP_NISPLUS=yes
- # LOOKUP_ORACLE=yes
Index: exim-4.88.tar.bz2
===================================================================
Binary file exim-4.88.tar.bz2 (revision 200) deleted
Index: exim-4.88.tar.bz2.asc
===================================================================
--- exim-4.88.tar.bz2.asc (revision 200)
+++ exim-4.88.tar.bz2.asc (deleted)
@@ -1,10 +0,0 @@
------BEGIN PGP SIGNATURE-----
-
-iQEcBAABAgAGBQJYVqBoAAoJELzljIzkHzLf5vIH/R4gcGqdEwGkFDRwQA5ImNif
-USPeSli63U2tL2YRpf8E/sMWlf2ywZl9vGkVWhvYFvMWI4gn+hNAh0jUj2BakCdI
-aEjUk0KSA0nXHzIGmNyf0lAcC1VONRq0KLxfQvlGF8RrKnBL7urg46EVFagmU8g9
-m3KVHPjv1cUIICZdJVWICUChjjm23pBvtqr1M9TgUAhWQU0FaG9dmgY2Kh4s2pnG
-0o+llbQdU1hvtk0lTMzZYmYTtS3totoyR3aKYdws/epOnE1MgVOIlnp2q5R9FMO1
-RE5bHa2Qg5UCf5wwAKSOxIDLPEVUoX6qkbP7inByuGKZ5dSvBQwUGPAt+b2Lb38=
-=jgHZ
------END PGP SIGNATURE-----
Index: exim-CVE-2017-1000369.patch
===================================================================
--- exim-CVE-2017-1000369.patch (revision 200)
+++ exim-CVE-2017-1000369.patch (deleted)
@@ -1,43 +0,0 @@
-commit 65e061b76867a9ea7aeeb535341b790b90ae6c21
-Author: Heiko Schlittermann (HS12-RIPE) <hs@schlittermann.de>
-Date:   Wed May 31 23:08:56 2017 +0200
-
-    Cleanup (prevent repeated use of -p/-oMr to avoid mem leak)
-
-diff --git a/src/exim.c b/src/src/exim.c
-index 67583e58..88e11977 100644
---- a/src/exim.c
-+++ b/src/exim.c
-@@ -3106,7 +3106,14 @@ for (i = 1; i < argc; i++)
- 
-       /* -oMr: Received protocol */
- 
--      else if (Ustrcmp(argrest, "Mr") == 0) received_protocol = argv[++i];
-+      else if (Ustrcmp(argrest, "Mr") == 0)
-+
-+        if (received_protocol)
-+          {
-+          fprintf(stderr, "received_protocol is set already\n");
-+          exit(EXIT_FAILURE);
-+          }
-+        else received_protocol = argv[++i];
- 
-       /* -oMs: Set sender host name */
- 
-@@ -3202,7 +3209,15 @@ for (i = 1; i < argc; i++)
- 
-     if (*argrest != 0)
-       {
--      uschar *hn = Ustrchr(argrest, ':');
-+      uschar *hn;
-+
-+      if (received_protocol)
-+        {
-+        fprintf(stderr, "received_protocol is set already\n");
-+        exit(EXIT_FAILURE);
-+        }
-+
-+      hn = Ustrchr(argrest, ':');
-       if (hn == NULL)
-         {
-         received_protocol = argrest;
Index: exim-CVE-2017-16943.patch
===================================================================
--- exim-CVE-2017-16943.patch (revision 200)
+++ exim-CVE-2017-16943.patch (deleted)
@@ -1,40 +0,0 @@
-From 4e6ae6235c68de243b1c2419027472d7659aa2b4 Mon Sep 17 00:00:00 2001
-From: Jeremy Harris <jgh146exb@wizmail.org>
-Date: Fri, 24 Nov 2017 20:22:33 +0000
-Subject: [PATCH] Avoid release of store if there have been later allocations. 
- Bug 2199
-
----
- src/src/receive.c | 7 ++++---
- 1 file changed, 4 insertions(+), 3 deletions(-)
-
-diff --git a/src/src/receive.c b/src/src/receive.c
-index e7e518a..d9b5001 100644
---- a/src/receive.c
-+++ b/src/receive.c
-@@ -1810,8 +1810,8 @@ for (;;)
-   (and sometimes lunatic messages can have ones that are 100s of K long) we
-   call store_release() for strings that have been copied - if the string is at
-   the start of a block (and therefore the only thing in it, because we aren't
--  doing any other gets), the block gets freed. We can only do this because we
--  know there are no other calls to store_get() going on. */
-+  doing any other gets), the block gets freed. We can only do this release if
-+  there were no allocations since the once that we want to free. */
- 
-   if (ptr >= header_size - 4)
-     {
-@@ -1820,9 +1820,10 @@ for (;;)
-     header_size *= 2;
-     if (!store_extend(next->text, oldsize, header_size))
-       {
-+      BOOL release_ok = store_last_get[store_pool] == next->text;
-       uschar *newtext = store_get(header_size);
-       memcpy(newtext, next->text, ptr);
--      store_release(next->text);
-+      if (release_ok) store_release(next->text);
-       next->text = newtext;
-       }
-     }
--- 
-1.9.1
-
Index: exim-CVE-2017-16944.patch
===================================================================
--- exim-CVE-2017-16944.patch (revision 200)
+++ exim-CVE-2017-16944.patch (deleted)
@@ -1,41 +0,0 @@
-diff -ru a/src/receive.c b/src/receive.c
---- a/src/receive.c	2017-11-30 09:15:29.593364805 +0100
-+++ b/src/receive.c	2017-11-30 09:17:32.026970431 +0100
-@@ -1759,7 +1759,7 @@
-   prevent further reading), and break out of the loop, having freed the
-   empty header, and set next = NULL to indicate no data line. */
- 
--  if (ptr == 0 && ch == '.' && (smtp_input || dot_ends))
-+  if (ptr == 0 && ch == '.' && dot_ends)
-     {
-     ch = (receive_getc)();
-     if (ch == '\r')
-diff -ru a/src/smtp_in.c b/src/smtp_in.c
---- a/src/smtp_in.c	2017-11-30 09:15:29.593364805 +0100
-+++ b/src/smtp_in.c	2017-11-30 09:41:47.270055566 +0100
-@@ -4751,11 +4751,17 @@
- 	? CHUNKING_LAST : CHUNKING_ACTIVE;
-       chunking_data_left = chunking_datasize;
- 
-+      /* push the current receive_* function on the "stack", and
-+      replace them by bdat_getc(), which in turn will use the lwr_receive_*
-+      functions to do the dirty work. */
-       lwr_receive_getc = receive_getc;
-       lwr_receive_ungetc = receive_ungetc;
-+
-       receive_getc = bdat_getc;
-       receive_ungetc = bdat_ungetc;
- 
-+      dot_ends = FALSE;
-+
-       DEBUG(D_any)
-         debug_printf("chunking state %d\n", (int)chunking_state);
-       goto DATA_BDAT;
-@@ -4763,6 +4769,7 @@
- 
-     case DATA_CMD:
-     HAD(SCH_DATA);
-+    dot_ends = TRUE;
- 
-     DATA_BDAT:		/* Common code for DATA and BDAT */
-     if (!discarded && recipients_count <= 0)

OBS-URL: https://build.opensuse.org/request/show/576288
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=201
2018-02-15 11:52:20 +00:00
b3b3b42a68 Accepting request 546620 from home:pwcau:branches:server:mail
- add exim-CVE-2017-16944.patch:
  backport of commit 178ecb70987f024f0e775d87c2f8b2cf587dd542
  fix for CVE-2017-16944 (#bsc1069859)

OBS-URL: https://build.opensuse.org/request/show/546620
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=199
2017-12-08 08:47:08 +00:00
2d9c01ecd4 OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=197 2017-11-27 10:38:23 +00:00
1fea1019d9 - update to 4.88:
drops fix-CVE-2016-9963-31c02defdc5118834e801d4fe8f11c1d9b5ebadf.patch,
     exim-4.86.2+fixes-867e8fe25dbfb1e31493488ad695bde55b890397.patch
- update keyring

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=196
2017-11-27 10:38:08 +00:00
fedc49a34e - update to 4.87:
drops fix-CVE-2016-9963-31c02defdc5118834e801d4fe8f11c1d9b5ebadf.patch
- remove exim4-manpages.tar.bz2: upstream does not exist anymore

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=195
2017-11-27 10:36:58 +00:00
fd72976a49 - exim-CVE-2017-16943.patch: fixed possible code execution (CVE-2017-16943 bsc#1069857)
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=194
2017-11-27 10:01:58 +00:00
51dac3bc71 Accepting request 545886 from home:kstreitova:branches:server:mail
- add exim-4.86.2-mariadb_102_compile_fix.patch to fix compilation
   with the mariadb 10.2 (in our case the build with libmariadb
   library from the mariadb-connector-c package)
   * upstream commits: a12400fd4493b676e71613ab429e731f777ebd1e and
   31beb7972466a33a88770eacbce13490f2ddadc2

OBS-URL: https://build.opensuse.org/request/show/545886
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=193
2017-11-27 09:56:51 +00:00
8ca7e168f0 Accepting request 544713 from home:RBrownSUSE:branches:server:mail
Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)

OBS-URL: https://build.opensuse.org/request/show/544713
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=191
2017-11-24 09:59:37 +00:00
415f8955ae Accepting request 532725 from home:dimstar:Factory
- Explicitly buildrequire libnsl-devel on suse_version >= 1330:
  libnsl used to be an integrated part of glibc. Since the build
  system / makefiles explicitly reference libnsl, it is our own
  duty to ensure we have our deps in place.

OBS-URL: https://build.opensuse.org/request/show/532725
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=189
2017-10-16 08:31:15 +00:00
9e6c278c1b Accepting request 508092 from home:msmeissn:branches:server:mail
- specify users with ref:mail, to make them dynamic. bsc#1046971

OBS-URL: https://build.opensuse.org/request/show/508092
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=187
2017-07-05 11:40:31 +00:00
45d7c59c3b Accepting request 506440 from home:pwcau:branches:server:mail
cleanup changelog and properly reference the patch files to (hopefully) make the patch-reference checker in :Factory happy.

OBS-URL: https://build.opensuse.org/request/show/506440
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=185
2017-06-30 13:40:09 +00:00
048e707927 Accepting request 504846 from home:msmeissn:branches:server:mail
- exim-CVE-2017-1000369.patch: Fixed memory leaks that could be
  exploited to "stack crash" local privilege escalation (bsc#1044692)
- Require user(mail) group(mail) to meet new users handling in TW.
- Prerequire permissions (fixes rpmlint).

  CVE-2016-9963-31c02defdc5118834e801d4fe8f11c1d9b5ebadf.patch

OBS-URL: https://build.opensuse.org/request/show/504846
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=184
2017-06-22 14:02:16 +00:00
557870d382 Accepting request 490905 from home:pwcau:branches:server:mail
Corrections for inverted bcond

 import exim-4_86_2+fixes branch
    + fix CVE-2016-1531 
      when installed setuid root, allows local users to gain privileges via the perl_startup
      argument. 
    + fix Bug 1805: store the initial working directory, expand $initial_cwd
    + fix Bug 1671: segfault after delivery (https://bugs.exim.org/show_bug.cgi?id=1671)
    + Don't issue env warning if env is empty

- fix CVE-2016-9963: DKIM information leakage

- conditionally disable DANE on SuSE versions with OpenSSL < 1.0
- disable i18n by default, utf8_downconvert seems to cause crashes

OBS-URL: https://build.opensuse.org/request/show/490905
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=183
2017-04-25 09:33:40 +00:00
Matthias Mailänder
bc1cae7e1a Accepting request 384144 from home:conecenter:rev5a1:ontology:services--c:mail--o:mta--f
- Makefile tuning:
    + add sqlite support
    + disable WITH_OLD_DEMIME
    + enable AUTH_CYRUS_SASL
    + enable AUTH_TLS
    + enable SYSLOG_LONG_LINES
    + enable SUPPORT_PAM
    + MAX_NAMED_LIST=64
    + enable EXPERIMENTAL_DMARC
    + enable EXPERIMENTAL_EVENT
    + enable EXPERIMENTAL_PROXY
    + enable EXPERIMENTAL_CERTNAMES
    + enable EXPERIMENTAL_DSN
    + enable EXPERIMENTAL_DANE
    + enable EXPERIMENTAL_SOCKS
    + enable EXPERIMENTAL_INTERNATIONAL

OBS-URL: https://build.opensuse.org/request/show/384144
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=181
2016-10-03 16:20:54 +00:00
Lars Müller
3c53e92fc5 Polish change log reference slightly
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=179
2016-03-03 10:50:30 +00:00
Lars Müller
8b1130d773 Accepting request 365192 from home:AndreasStieger:branches:server:mail
add bugzilla reference

OBS-URL: https://build.opensuse.org/request/show/365192
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=178
2016-03-03 10:48:33 +00:00
Lars Müller
1fd26327cd Remove Exim-Maintainers-Keyring.asc
Was kept with intention as the file might be used with the next regular release.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=177
2016-03-02 21:36:27 +00:00
Lars Müller
a3749d19c0 - Update to 4.86.2
+ Fix minor portability issues for *BSD and OS/X.

- Update to 4.86.1
  + Add support for keep_environment and add_environment options;
    CVE-2016-1531.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=176
2016-03-02 21:22:07 +00:00
Lars Müller
a34acdddfe Accepting request 357608 from home:cboltz:branches:server:mail
- Move AppArmor profile to /usr/share/apparmor/extra-profiles/, which is
  the directory for inactive profiles since AppArmor 2.9

Please forward this fix to Factory (and 42.1, if you ever have to do an
update for it).


BTW: If you need help with updating the profile (ideally with the goal
to enable it by default), just ask.

OBS-URL: https://build.opensuse.org/request/show/357608
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=174
2016-02-03 21:09:03 +00:00
Lars Müller
fa5a3911df - Update the Exim Maintainers Keyring file 'exim.keyring'.
- Use URL for the source line of the main tar ball.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=172
2015-12-11 10:54:04 +00:00
Lars Müller
d81193c317 Accepting request 335998 from home:-miska-:arm
- Update to 4.86
  * Support for using the system standard CA bundle.
  * New expansion items $config_file, $config_dir, containing the file
    and directory name of the main configuration file. Also $exim_version.
  * New "malware=" support for Avast.
  * New "spam=" variant option for Rspamd.
  * Assorted options on malware= and spam= scanners.
  * A commandline option to write a comment into the logfile.
  * If built with EXPERIMENTAL_SOCKS feature enabled, the smtp transport can
    be configured to make connections via socks5 proxies.
  * If built with EXPERIMENTAL_INTERNATIONAL, support is included for
    the transmission of UTF-8 envelope addresses.
  * If built with EXPERIMENTAL_INTERNATIONAL, an expansion item for a commonly
    used encoding of Maildir folder names.
  * A logging option for slow DNS lookups.
  * New ${env {<variable>}} expansion.
  * A non-SMTP authenticator using information from TLS client certificates.
  * Main option "tls_eccurve" for selecting an Elliptic Curve for TLS.
    Patch originally by Wolfgang Breyha.
  * Main option "dns_trust_aa" for trusting your local nameserver at the
    same level as DNSSEC.
- Dropped exim-enable_ecdh_openssl.patch as included in upstream

OBS-URL: https://build.opensuse.org/request/show/335998
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=171
2015-10-12 20:32:07 +00:00
Lars Müller
282a8d36e0 Add references to boo#935601
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=169
2015-06-23 14:00:54 +00:00
Lars Müller
56a30e3bc5 Nuke dankling spaces at eol from the package change log
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=168
2015-06-23 12:38:57 +00:00
Lars Müller
09a677d56a Fix the systemd service file by not passing EXIM_ARGS as one single
argument by removing the curly brackets (shell syntax).

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=166
2015-05-06 21:33:08 +00:00
Lars Müller
645ea49799 - Install fitting eximstats.conf depending on SUSE version; (bsc#926861).
- Add attribute dir to /etc/apache2 and /etc/apache2/conf.d in the file list.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=164
2015-04-17 16:29:46 +00:00
Lars Müller
719cba142c Replace the fixed ExecStart arguments by ${EXIM_ARGS} as defined in
/etc/sysconfig/exim; (bsc#922145).

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=162
2015-03-13 12:28:55 +00:00
Lars Müller
ca1e0198e0 Set CFLAGS_OPT_WERROR only on post-5 CentOS and RHEL systems.
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=160
2015-01-24 23:07:35 +00:00
Lars Müller
e5a0307296 Drop BuildRequires xorg-x11-server-sdk for non SUSE systems in particular to
build on RHEL 6 again.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=159
2015-01-24 22:36:10 +00:00
Lars Müller
9cbf4ddd30 Let ld know the path to mysqlclient.
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=158
2015-01-24 22:17:02 +00:00
Lars Müller
4040bfe97f - update to 4.85
See doc/ChangeLog from the main tar ball or the exim file for
  more details.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=157
2015-01-24 19:56:27 +00:00
Tomáš Chvátal
8642790a1a Accepting request 280598 from home:-miska-:arm
Add support for spf, mysql and other small fixes

OBS-URL: https://build.opensuse.org/request/show/280598
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=156
2015-01-12 16:44:39 +00:00
Lars Müller
fa3c7698ca Removed executable permission bits from exim.service file.
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=154
2014-12-05 12:49:45 +00:00
Lars Müller
ba0024da3a Remove dependency on gpg-offline as signature checking is implemented in the
source validator.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=152
2014-11-26 14:42:09 +00:00
Lars Müller
4029445955 - update to 4.84
+ Re-add a 'return NULL' to silence complaints from static checkers that
    were complaining about end of non-void function with no return;
	 (beo#1506); obsoletes silence-static-checkers.patch.
  + Fix parsing of quoted parameter values in MIME headers.
    This was a regression intruduced in 4.83 by another bugfix; (beo#1513).
  + Fix broken compilation when EXPERIMENTAL_DSN is enabled.
  + Fix exipick for enhanced spoolfile specification used when
    EXPERIMENTAL_DNS is enabled; (beo#1509).

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=151
2014-11-26 14:16:35 +00:00
Lars Müller
ff1c93e649 Add an empty line to better visually separate %postun from %verifyscript.
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=149
2014-08-12 14:45:40 +00:00