102 Commits

Author SHA256 Message Date
64cccf5ce7 OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=215 2019-09-11 13:54:59 +00:00
Peter Poeml
221a1e1a2f - update to exim 4.92.2
* CVE-2019-15846: fix against remote attackers executing arbitrary code as
    root via a trailing backslash

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=214
2019-09-07 18:25:29 +00:00
4e1beab9c5 Accepting request 718574 from home:atopt:branches:server:mail
- update to exim 4.92.1
 * CVE-2019-13917: Fixed an issue with ${sort} expansion which could 
   allow remote attackers to execute other programs with root privileges 
   (boo#1142207)

OBS-URL: https://build.opensuse.org/request/show/718574
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=212
2019-07-25 17:09:32 +00:00
Lars Vogdt
fb03fe10ba Accepting request 707697 from home:pwcau:branches:server:mail
- spec file cleanup
 * fix DANE inclusion guard condition
 * re-enable i18n and remove misleading comment
 * EXPERIMENTAL_SPF is now SUPPORT_SPF
 * DANE is now SUPPORT_DANE

OBS-URL: https://build.opensuse.org/request/show/707697
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=210
2019-06-08 17:03:13 +00:00
5d10e57e5a Accepting request 687828 from home:seanlew:branches:server:mail
Update exim

OBS-URL: https://build.opensuse.org/request/show/687828
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=206
2019-03-23 19:33:03 +00:00
e824b0d25f Accepting request 675339 from home:pwcau:branches:server:mail
- update to exim 4.92
 * ${l_header:<name>} expansion
 * ${readsocket} now supports TLS
 * "utf8_downconvert" option (if built with SUPPORT_I18N)
 * "pipelining" log_selector
 * JSON variants for ${extract } expansion
 * "noutf8" debug option
 * TCP Fast Open support on MacOS
- add workaround patch for compile time error on missing printf
  format annotation (gnu_printf.patch)

OBS-URL: https://build.opensuse.org/request/show/675339
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=205
2019-02-18 09:04:39 +00:00
e5a07ffaf7 Accepting request 597094 from home:pwcau:branches:server:mail
update to 4.91.

Note that this removes two, previously deprecated SPF ACL conditions (err_temp and err_perm).

OBS-URL: https://build.opensuse.org/request/show/597094
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=203
2018-05-02 15:09:25 +00:00
3bb5245254 Accepting request 587627 from home:elvigia:branches:server:mail
- Replace xorg-x11-devel by individual pkgconfig() buildrequires.

OBS-URL: https://build.opensuse.org/request/show/587627
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=202
2018-03-20 10:29:00 +00:00
1b59343493 Accepting request 576288 from home:kbabioch:branches:server:mail
- update to 4.90.1
  * Allow PKG_CONFIG_PATH to be set in Local/Makefile and use it correctly
    during configuration.  Wildcards are allowed and expanded.
  * Shorten the log line for daemon startup by collapsing adjacent sets of
    identical IP addresses on different listening ports.  Will also affect
    "exiwhat" output.
  * Tighten up the checking in isip4 (et al): dotted-quad components larger
    than 255 are no longer allowed.
  * Default openssl_options to include +no_ticket, to reduce load on peers.
    Disable the session-cache too, which might reduce our load.  Since we
    currrectly use a new context for every connection, both as server and
    client, there is no benefit for these.
  * Add $SOURCE_DATE_EPOCH support for reproducible builds, per spec at
    <https://reproducible-builds.org/specs/source-date-epoch/>.
  * Fix smtp transport use of limited max_rcpt under mua_wrapper. Previously
    the check for any unsuccessful recipients did not notice the limit, and
    erroneously found still-pending ones.
  * Pipeline CHUNKING command and data together, on kernels that support
    MSG_MORE.  Only in-clear (not on TLS connections).
  * Avoid using a temporary file during transport using dkim.  Unless a
    transport-filter is involved we can buffer the headers in memory for
    creating the signature, and read the spool data file once for the
    signature and again for transmission.
  * Enable use of sendfile in Linux builds as default.  It was disabled in
    4.77 as the kernel support then wasn't solid, having issues in 64bit
    mode.  Now, it's been long enough.  Add support for FreeBSD also.
  * Add commandline_checks_require_admin option.
  * Do pipelining under TLS.
  * For the "sock" variant of the malware scanner interface, accept an empty
    cmdline element to get the documented default one.  Previously it was
    inaccessible.
  * Prevent repeated use of -p/-oMr
  * DKIM: enforce the DNS pubkey record "h" permitted-hashes optional field,
    if present.
  * DKIM: when a message has multiple signatures matching an identity given
    in dkim_verify_signers, run the dkim acl once for each.
  * Support IDNA2008.
  * The path option on a pipe transport is now expanded before use
  * Have the EHLO response advertise VRFY, if there is a vrfy ACL defined.
- Several bug fixes
- Fix for buffer overflow in base64decode() (bsc#1079832 CVE-2018-6789)
- removed patches (included upstream now):
  * exim-CVE-2017-1000369.patch
  * exim-CVE-2017-16943.patch
  * exim-CVE-2017-16944.patch
  * exim-4.86.2-mariadb_102_compile_fix.patch

old: server:mail/exim
new: home:kbabioch:branches:server:mail/exim rev None
Index: exim.changes
===================================================================
--- exim.changes (revision 200)
+++ exim.changes (revision 4)
@@ -1,4 +1,54 @@
 -------------------------------------------------------------------
+Tue Feb 13 13:39:34 UTC 2018 - kbabioch@suse.com
+
+- update to 4.90.1
+  * Allow PKG_CONFIG_PATH to be set in Local/Makefile and use it correctly
+    during configuration.  Wildcards are allowed and expanded.
+  * Shorten the log line for daemon startup by collapsing adjacent sets of
+    identical IP addresses on different listening ports.  Will also affect
+    "exiwhat" output.
+  * Tighten up the checking in isip4 (et al): dotted-quad components larger
+    than 255 are no longer allowed.
+  * Default openssl_options to include +no_ticket, to reduce load on peers.
+    Disable the session-cache too, which might reduce our load.  Since we
+    currrectly use a new context for every connection, both as server and
+    client, there is no benefit for these.
+  * Add $SOURCE_DATE_EPOCH support for reproducible builds, per spec at
+    <https://reproducible-builds.org/specs/source-date-epoch/>.
+  * Fix smtp transport use of limited max_rcpt under mua_wrapper. Previously
+    the check for any unsuccessful recipients did not notice the limit, and
+    erroneously found still-pending ones.
+  * Pipeline CHUNKING command and data together, on kernels that support
+    MSG_MORE.  Only in-clear (not on TLS connections).
+  * Avoid using a temporary file during transport using dkim.  Unless a
+    transport-filter is involved we can buffer the headers in memory for
+    creating the signature, and read the spool data file once for the
+    signature and again for transmission.
+  * Enable use of sendfile in Linux builds as default.  It was disabled in
+    4.77 as the kernel support then wasn't solid, having issues in 64bit
+    mode.  Now, it's been long enough.  Add support for FreeBSD also.
+  * Add commandline_checks_require_admin option.
+  * Do pipelining under TLS.
+  * For the "sock" variant of the malware scanner interface, accept an empty
+    cmdline element to get the documented default one.  Previously it was
+    inaccessible.
+  * Prevent repeated use of -p/-oMr
+  * DKIM: enforce the DNS pubkey record "h" permitted-hashes optional field,
+    if present.
+  * DKIM: when a message has multiple signatures matching an identity given
+    in dkim_verify_signers, run the dkim acl once for each.
+  * Support IDNA2008.
+  * The path option on a pipe transport is now expanded before use
+  * Have the EHLO response advertise VRFY, if there is a vrfy ACL defined.
+- Several bug fixes
+- Fix for buffer overflow in base64decode() (bsc#1079832 CVE-2018-6789)
+- removed patches (included upstream now):
+  * exim-CVE-2017-1000369.patch
+  * exim-CVE-2017-16943.patch
+  * exim-CVE-2017-16944.patch
+  * exim-4.86.2-mariadb_102_compile_fix.patch
+
+-------------------------------------------------------------------
 Thu Nov 30 08:32:50 UTC 2017 - wullinger@rz.uni-kiel.de
 
 - add exim-CVE-2017-16944.patch:
Index: exim.spec
===================================================================
--- exim.spec (revision 200)
+++ exim.spec (revision 4)
@@ -1,7 +1,7 @@
 #
 # spec file for package exim
 #
-# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -78,7 +78,7 @@
 %endif
 Requires(pre):  fileutils textutils
 %endif
-Version:        4.88
+Version:        4.90.1
 Release:        0
 %if %{with_mysql}
 BuildRequires:  mysql-devel
@@ -93,8 +93,8 @@
 License:        GPL-2.0+
 Group:          Productivity/Networking/Email/Servers
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
-Source:         http://ftp.exim.org/pub/exim/exim4/old/exim-%{version}.tar.bz2
-Source3:        http://ftp.exim.org/pub/exim/exim4/old/exim-%{version}.tar.bz2.asc
+Source:         http://ftp.exim.org/pub/exim/exim4/exim-%{version}.tar.bz2
+Source3:        http://ftp.exim.org/pub/exim/exim4/exim-%{version}.tar.bz2.asc
 # http://ftp.exim.org/pub/exim/Exim-Maintainers-Keyring.asc
 Source4:        exim.keyring
 Source1:        sysconfig.exim
@@ -107,10 +107,6 @@
 Source32:       eximstats.conf-2.2
 Source40:       exim.service
 Patch0:         exim-tail.patch
-Patch3:         exim-CVE-2017-1000369.patch
-Patch4:         exim-CVE-2017-16943.patch
-Patch5:         exim-CVE-2017-16944.patch
-Patch6:         exim-4.86.2-mariadb_102_compile_fix.patch
 
 %package -n eximon
 Summary:        Eximon, an graphical frontend to administer Exim's mail queue
@@ -153,10 +149,6 @@
 %prep
 %setup -q -n exim-%{version}
 %patch0
-%patch3 -p 1
-%patch4 -p 1
-%patch5 -p 1
-%patch6 -p 1
 # build with fPIE/pie on SUSE 10.0 or newer, or on any other platform
 %if %{?suse_version:%suse_version}%{?!suse_version:99999} > 930
 fPIE="-fPIE"
@@ -328,7 +320,7 @@
 	inst_info=$RPM_BUILD_ROOT/%{_infodir} \
 	INSTALL_ARG=-no_chown 	install
 #mv $RPM_BUILD_ROOT/usr/sbin/exim-%{version}* $RPM_BUILD_ROOT/usr/sbin/exim
-mv $RPM_BUILD_ROOT/usr/sbin/exim-4.8* $RPM_BUILD_ROOT/usr/sbin/exim
+mv $RPM_BUILD_ROOT/usr/sbin/exim-4.9* $RPM_BUILD_ROOT/usr/sbin/exim
 mv $RPM_BUILD_ROOT/etc/exim/exim.conf src/configure.default # with all substitutions done
 %if 0%{?suse_version} > 1220
 install -m 0644 %{S:40} $RPM_BUILD_ROOT/%{_unitdir}/exim.service
Index: exim-4.90.1.tar.bz2
===================================================================
Binary file exim-4.90.1.tar.bz2 (revision 4) added
Index: exim-4.90.1.tar.bz2.asc
===================================================================
--- exim-4.90.1.tar.bz2.asc (added)
+++ exim-4.90.1.tar.bz2.asc (revision 4)
@@ -0,0 +1,11 @@
+-----BEGIN PGP SIGNATURE-----
+
+iQEzBAABCgAdFiEE0L/WueylaUpvFJ3Or0zGdqa2wUIFAlp8U0MACgkQr0zGdqa2
+wUKEiwf9GmNYK5sbmpi/c2TdfPqsqU1o76l3PoTt+kxSQi5t4j30dsqZdWvzvkuj
+k+/x1SsDRg44+wv19ynnYH4tSCZ3QSwTevyfXvR7bSGpSTCN0tTnaWm/AuBXNC8D
+9lukQckwdZckVNciRriVCLi9VTymV/tdnIxowQu/WfdEzFTXDeYzu3KoioG+jKAV
+MWhnyUDfhPYPYs+u8IKdFDE3Z9bO/I/EbgTHiR6PetLWusSugrp/MyJjICp8HsvI
+f/pMj+rytJo2hOnI9x/wpUiXb7XnnQnph3mic5BQU4DF+tI6dK1zTS66PyTYAoNI
+p6Po3uLY/umKYT+W6jxURPfC2TH1+A==
+=k4cD
+-----END PGP SIGNATURE-----
Index: exim-4.86.2-mariadb_102_compile_fix.patch
===================================================================
--- exim-4.86.2-mariadb_102_compile_fix.patch (revision 200)
+++ exim-4.86.2-mariadb_102_compile_fix.patch (deleted)
@@ -1,94 +0,0 @@
-Index: exim-4.86.2/src/lookups/mysql.c
-===================================================================
---- exim-4.86.2.orig/src/lookups/mysql.c
-+++ exim-4.86.2/src/lookups/mysql.c
-@@ -14,6 +14,53 @@ functions. */
- 
- #include <mysql.h>       /* The system header */
- 
-+/* We define symbols for *_VERSION_ID (numeric), *_VERSION_STR (char*)
-+and *_BASE_STR (char*). It's a bit of guesswork. Especially for mariadb
-+with versions before 10.2, as they do not define there there specific symbols.
-+*/
-+
-+// Newer (>= 10.2) MariaDB
-+#if defined                   MARIADB_VERSION_ID
-+#define EXIM_MxSQL_VERSION_ID MARIADB_VERSION_ID
-+
-+// MySQL defines MYSQL_VERSION_ID, and MariaDB does so
-+// https://dev.mysql.com/doc/refman/5.7/en/c-api-server-client-versions.html
-+#elif defined                 LIBMYSQL_VERSION_ID
-+#define EXIM_MxSQL_VERSION_ID LIBMYSQL_VERSION_ID
-+#elif defined                 MYSQL_VERSION_ID
-+#define EXIM_MxSQL_VERSION_ID MYSQL_VERSION_ID
-+
-+#else
-+#define EXIM_MYSQL_VERSION_ID  0
-+#endif
-+
-+// Newer (>= 10.2) MariaDB
-+#ifdef                         MARIADB_CLIENT_VERSION_STR
-+#define EXIM_MxSQL_VERSION_STR MARIADB_CLIENT_VERSION_STR
-+
-+// Mysql uses MYSQL_SERVER_VERSION
-+#elif defined                  LIBMYSQL_VERSION
-+#define EXIM_MxSQL_VERSION_STR LIBMYSQL_VERSION
-+#elif defined                  MYSQL_SERVER_VERSION
-+#define EXIM_MxSQL_VERSION_STR MYSQL_SERVER_VERSION
-+
-+#else
-+#define EXIM_MxSQL_VERSION_STR  "N.A."
-+#endif
-+
-+#if defined                 MARIADB_BASE_VERSION
-+#define EXIM_MxSQL_BASE_STR MARIADB_BASE_VERSION
-+
-+#elif defined               MARIADB_PACKAGE_VERSION
-+#define EXIM_MxSQL_BASE_STR "mariadb"
-+
-+#elif defined               MYSQL_BASE_VERSION
-+#define EXIM_MxSQL_BASE_STR MYSQL_BASE_VERSION
-+
-+#else
-+#define EXIM_MxSQL_BASE_STR  "n.A."
-+#endif
-+
- 
- /* Structure and anchor for caching connections. */
- 
-@@ -423,10 +470,10 @@ return quoted;
- void
- mysql_version_report(FILE *f)
- {
--fprintf(f, "Library version: MySQL: Compile: %s [%s]\n"
--           "                        Runtime: %s\n",
--        MYSQL_SERVER_VERSION, MYSQL_COMPILATION_COMMENT,
--        mysql_get_client_info());
-+fprintf(f, "Library version: MySQL: Compile: %lu %s [%s]\n"
-+           "                        Runtime: %lu %s\n",
-+        (long)EXIM_MxSQL_VERSION_ID, EXIM_MxSQL_VERSION_STR, EXIM_MxSQL_BASE_STR,
-+        mysql_get_client_version(), mysql_get_client_info());
- #ifdef DYNLOOKUP
- fprintf(f, "                        Exim version %s\n", EXIM_VERSION_STR);
- #endif
-Index: exim-4.86.2/src/EDITME
-===================================================================
---- exim-4.86.2.orig/src/EDITME
-+++ exim-4.86.2/src/EDITME
-@@ -253,7 +253,7 @@ TRANSPORT_SMTP=yes
- # you perform upgrades and revert them. You should consider the benefit of
- # embedding the Exim version number into LOOKUP_MODULE_DIR, so that you can
- # maintain two concurrent sets of modules.
--# 
-+#
- # *BEWARE*: ability to modify the files in LOOKUP_MODULE_DIR is equivalent to
- # the ability to modify the Exim binary, which is often setuid root!  The Exim
- # developers only intend this functionality be used by OS software packagers
-@@ -301,6 +301,7 @@ LOOKUP_DNSDB=yes
- # LOOKUP_IBASE=yes
- # LOOKUP_LDAP=yes
- # LOOKUP_MYSQL=yes
-+# LOOKUP_MYSQL_PC=mariadb
- # LOOKUP_NIS=yes
- # LOOKUP_NISPLUS=yes
- # LOOKUP_ORACLE=yes
Index: exim-4.88.tar.bz2
===================================================================
Binary file exim-4.88.tar.bz2 (revision 200) deleted
Index: exim-4.88.tar.bz2.asc
===================================================================
--- exim-4.88.tar.bz2.asc (revision 200)
+++ exim-4.88.tar.bz2.asc (deleted)
@@ -1,10 +0,0 @@
------BEGIN PGP SIGNATURE-----
-
-iQEcBAABAgAGBQJYVqBoAAoJELzljIzkHzLf5vIH/R4gcGqdEwGkFDRwQA5ImNif
-USPeSli63U2tL2YRpf8E/sMWlf2ywZl9vGkVWhvYFvMWI4gn+hNAh0jUj2BakCdI
-aEjUk0KSA0nXHzIGmNyf0lAcC1VONRq0KLxfQvlGF8RrKnBL7urg46EVFagmU8g9
-m3KVHPjv1cUIICZdJVWICUChjjm23pBvtqr1M9TgUAhWQU0FaG9dmgY2Kh4s2pnG
-0o+llbQdU1hvtk0lTMzZYmYTtS3totoyR3aKYdws/epOnE1MgVOIlnp2q5R9FMO1
-RE5bHa2Qg5UCf5wwAKSOxIDLPEVUoX6qkbP7inByuGKZ5dSvBQwUGPAt+b2Lb38=
-=jgHZ
------END PGP SIGNATURE-----
Index: exim-CVE-2017-1000369.patch
===================================================================
--- exim-CVE-2017-1000369.patch (revision 200)
+++ exim-CVE-2017-1000369.patch (deleted)
@@ -1,43 +0,0 @@
-commit 65e061b76867a9ea7aeeb535341b790b90ae6c21
-Author: Heiko Schlittermann (HS12-RIPE) <hs@schlittermann.de>
-Date:   Wed May 31 23:08:56 2017 +0200
-
-    Cleanup (prevent repeated use of -p/-oMr to avoid mem leak)
-
-diff --git a/src/exim.c b/src/src/exim.c
-index 67583e58..88e11977 100644
---- a/src/exim.c
-+++ b/src/exim.c
-@@ -3106,7 +3106,14 @@ for (i = 1; i < argc; i++)
- 
-       /* -oMr: Received protocol */
- 
--      else if (Ustrcmp(argrest, "Mr") == 0) received_protocol = argv[++i];
-+      else if (Ustrcmp(argrest, "Mr") == 0)
-+
-+        if (received_protocol)
-+          {
-+          fprintf(stderr, "received_protocol is set already\n");
-+          exit(EXIT_FAILURE);
-+          }
-+        else received_protocol = argv[++i];
- 
-       /* -oMs: Set sender host name */
- 
-@@ -3202,7 +3209,15 @@ for (i = 1; i < argc; i++)
- 
-     if (*argrest != 0)
-       {
--      uschar *hn = Ustrchr(argrest, ':');
-+      uschar *hn;
-+
-+      if (received_protocol)
-+        {
-+        fprintf(stderr, "received_protocol is set already\n");
-+        exit(EXIT_FAILURE);
-+        }
-+
-+      hn = Ustrchr(argrest, ':');
-       if (hn == NULL)
-         {
-         received_protocol = argrest;
Index: exim-CVE-2017-16943.patch
===================================================================
--- exim-CVE-2017-16943.patch (revision 200)
+++ exim-CVE-2017-16943.patch (deleted)
@@ -1,40 +0,0 @@
-From 4e6ae6235c68de243b1c2419027472d7659aa2b4 Mon Sep 17 00:00:00 2001
-From: Jeremy Harris <jgh146exb@wizmail.org>
-Date: Fri, 24 Nov 2017 20:22:33 +0000
-Subject: [PATCH] Avoid release of store if there have been later allocations. 
- Bug 2199
-
----
- src/src/receive.c | 7 ++++---
- 1 file changed, 4 insertions(+), 3 deletions(-)
-
-diff --git a/src/src/receive.c b/src/src/receive.c
-index e7e518a..d9b5001 100644
---- a/src/receive.c
-+++ b/src/receive.c
-@@ -1810,8 +1810,8 @@ for (;;)
-   (and sometimes lunatic messages can have ones that are 100s of K long) we
-   call store_release() for strings that have been copied - if the string is at
-   the start of a block (and therefore the only thing in it, because we aren't
--  doing any other gets), the block gets freed. We can only do this because we
--  know there are no other calls to store_get() going on. */
-+  doing any other gets), the block gets freed. We can only do this release if
-+  there were no allocations since the once that we want to free. */
- 
-   if (ptr >= header_size - 4)
-     {
-@@ -1820,9 +1820,10 @@ for (;;)
-     header_size *= 2;
-     if (!store_extend(next->text, oldsize, header_size))
-       {
-+      BOOL release_ok = store_last_get[store_pool] == next->text;
-       uschar *newtext = store_get(header_size);
-       memcpy(newtext, next->text, ptr);
--      store_release(next->text);
-+      if (release_ok) store_release(next->text);
-       next->text = newtext;
-       }
-     }
--- 
-1.9.1
-
Index: exim-CVE-2017-16944.patch
===================================================================
--- exim-CVE-2017-16944.patch (revision 200)
+++ exim-CVE-2017-16944.patch (deleted)
@@ -1,41 +0,0 @@
-diff -ru a/src/receive.c b/src/receive.c
---- a/src/receive.c	2017-11-30 09:15:29.593364805 +0100
-+++ b/src/receive.c	2017-11-30 09:17:32.026970431 +0100
-@@ -1759,7 +1759,7 @@
-   prevent further reading), and break out of the loop, having freed the
-   empty header, and set next = NULL to indicate no data line. */
- 
--  if (ptr == 0 && ch == '.' && (smtp_input || dot_ends))
-+  if (ptr == 0 && ch == '.' && dot_ends)
-     {
-     ch = (receive_getc)();
-     if (ch == '\r')
-diff -ru a/src/smtp_in.c b/src/smtp_in.c
---- a/src/smtp_in.c	2017-11-30 09:15:29.593364805 +0100
-+++ b/src/smtp_in.c	2017-11-30 09:41:47.270055566 +0100
-@@ -4751,11 +4751,17 @@
- 	? CHUNKING_LAST : CHUNKING_ACTIVE;
-       chunking_data_left = chunking_datasize;
- 
-+      /* push the current receive_* function on the "stack", and
-+      replace them by bdat_getc(), which in turn will use the lwr_receive_*
-+      functions to do the dirty work. */
-       lwr_receive_getc = receive_getc;
-       lwr_receive_ungetc = receive_ungetc;
-+
-       receive_getc = bdat_getc;
-       receive_ungetc = bdat_ungetc;
- 
-+      dot_ends = FALSE;
-+
-       DEBUG(D_any)
-         debug_printf("chunking state %d\n", (int)chunking_state);
-       goto DATA_BDAT;
-@@ -4763,6 +4769,7 @@
- 
-     case DATA_CMD:
-     HAD(SCH_DATA);
-+    dot_ends = TRUE;
- 
-     DATA_BDAT:		/* Common code for DATA and BDAT */
-     if (!discarded && recipients_count <= 0)

OBS-URL: https://build.opensuse.org/request/show/576288
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=201
2018-02-15 11:52:20 +00:00
b3b3b42a68 Accepting request 546620 from home:pwcau:branches:server:mail
- add exim-CVE-2017-16944.patch:
  backport of commit 178ecb70987f024f0e775d87c2f8b2cf587dd542
  fix for CVE-2017-16944 (#bsc1069859)

OBS-URL: https://build.opensuse.org/request/show/546620
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=199
2017-12-08 08:47:08 +00:00
fedc49a34e - update to 4.87:
drops fix-CVE-2016-9963-31c02defdc5118834e801d4fe8f11c1d9b5ebadf.patch
- remove exim4-manpages.tar.bz2: upstream does not exist anymore

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=195
2017-11-27 10:36:58 +00:00
fd72976a49 - exim-CVE-2017-16943.patch: fixed possible code execution (CVE-2017-16943 bsc#1069857)
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=194
2017-11-27 10:01:58 +00:00
51dac3bc71 Accepting request 545886 from home:kstreitova:branches:server:mail
- add exim-4.86.2-mariadb_102_compile_fix.patch to fix compilation
   with the mariadb 10.2 (in our case the build with libmariadb
   library from the mariadb-connector-c package)
   * upstream commits: a12400fd4493b676e71613ab429e731f777ebd1e and
   31beb7972466a33a88770eacbce13490f2ddadc2

OBS-URL: https://build.opensuse.org/request/show/545886
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=193
2017-11-27 09:56:51 +00:00
8ca7e168f0 Accepting request 544713 from home:RBrownSUSE:branches:server:mail
Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)

OBS-URL: https://build.opensuse.org/request/show/544713
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=191
2017-11-24 09:59:37 +00:00
415f8955ae Accepting request 532725 from home:dimstar:Factory
- Explicitly buildrequire libnsl-devel on suse_version >= 1330:
  libnsl used to be an integrated part of glibc. Since the build
  system / makefiles explicitly reference libnsl, it is our own
  duty to ensure we have our deps in place.

OBS-URL: https://build.opensuse.org/request/show/532725
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=189
2017-10-16 08:31:15 +00:00
9e6c278c1b Accepting request 508092 from home:msmeissn:branches:server:mail
- specify users with ref:mail, to make them dynamic. bsc#1046971

OBS-URL: https://build.opensuse.org/request/show/508092
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=187
2017-07-05 11:40:31 +00:00
048e707927 Accepting request 504846 from home:msmeissn:branches:server:mail
- exim-CVE-2017-1000369.patch: Fixed memory leaks that could be
  exploited to "stack crash" local privilege escalation (bsc#1044692)
- Require user(mail) group(mail) to meet new users handling in TW.
- Prerequire permissions (fixes rpmlint).

  CVE-2016-9963-31c02defdc5118834e801d4fe8f11c1d9b5ebadf.patch

OBS-URL: https://build.opensuse.org/request/show/504846
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=184
2017-06-22 14:02:16 +00:00
557870d382 Accepting request 490905 from home:pwcau:branches:server:mail
Corrections for inverted bcond

 import exim-4_86_2+fixes branch
    + fix CVE-2016-1531 
      when installed setuid root, allows local users to gain privileges via the perl_startup
      argument. 
    + fix Bug 1805: store the initial working directory, expand $initial_cwd
    + fix Bug 1671: segfault after delivery (https://bugs.exim.org/show_bug.cgi?id=1671)
    + Don't issue env warning if env is empty

- fix CVE-2016-9963: DKIM information leakage

- conditionally disable DANE on SuSE versions with OpenSSL < 1.0
- disable i18n by default, utf8_downconvert seems to cause crashes

OBS-URL: https://build.opensuse.org/request/show/490905
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=183
2017-04-25 09:33:40 +00:00
Matthias Mailänder
bc1cae7e1a Accepting request 384144 from home:conecenter:rev5a1:ontology:services--c:mail--o:mta--f
- Makefile tuning:
    + add sqlite support
    + disable WITH_OLD_DEMIME
    + enable AUTH_CYRUS_SASL
    + enable AUTH_TLS
    + enable SYSLOG_LONG_LINES
    + enable SUPPORT_PAM
    + MAX_NAMED_LIST=64
    + enable EXPERIMENTAL_DMARC
    + enable EXPERIMENTAL_EVENT
    + enable EXPERIMENTAL_PROXY
    + enable EXPERIMENTAL_CERTNAMES
    + enable EXPERIMENTAL_DSN
    + enable EXPERIMENTAL_DANE
    + enable EXPERIMENTAL_SOCKS
    + enable EXPERIMENTAL_INTERNATIONAL

OBS-URL: https://build.opensuse.org/request/show/384144
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=181
2016-10-03 16:20:54 +00:00
Lars Müller
a3749d19c0 - Update to 4.86.2
+ Fix minor portability issues for *BSD and OS/X.

- Update to 4.86.1
  + Add support for keep_environment and add_environment options;
    CVE-2016-1531.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=176
2016-03-02 21:22:07 +00:00
Lars Müller
a34acdddfe Accepting request 357608 from home:cboltz:branches:server:mail
- Move AppArmor profile to /usr/share/apparmor/extra-profiles/, which is
  the directory for inactive profiles since AppArmor 2.9

Please forward this fix to Factory (and 42.1, if you ever have to do an
update for it).


BTW: If you need help with updating the profile (ideally with the goal
to enable it by default), just ask.

OBS-URL: https://build.opensuse.org/request/show/357608
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=174
2016-02-03 21:09:03 +00:00
Lars Müller
fa5a3911df - Update the Exim Maintainers Keyring file 'exim.keyring'.
- Use URL for the source line of the main tar ball.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=172
2015-12-11 10:54:04 +00:00
Lars Müller
d81193c317 Accepting request 335998 from home:-miska-:arm
- Update to 4.86
  * Support for using the system standard CA bundle.
  * New expansion items $config_file, $config_dir, containing the file
    and directory name of the main configuration file. Also $exim_version.
  * New "malware=" support for Avast.
  * New "spam=" variant option for Rspamd.
  * Assorted options on malware= and spam= scanners.
  * A commandline option to write a comment into the logfile.
  * If built with EXPERIMENTAL_SOCKS feature enabled, the smtp transport can
    be configured to make connections via socks5 proxies.
  * If built with EXPERIMENTAL_INTERNATIONAL, support is included for
    the transmission of UTF-8 envelope addresses.
  * If built with EXPERIMENTAL_INTERNATIONAL, an expansion item for a commonly
    used encoding of Maildir folder names.
  * A logging option for slow DNS lookups.
  * New ${env {<variable>}} expansion.
  * A non-SMTP authenticator using information from TLS client certificates.
  * Main option "tls_eccurve" for selecting an Elliptic Curve for TLS.
    Patch originally by Wolfgang Breyha.
  * Main option "dns_trust_aa" for trusting your local nameserver at the
    same level as DNSSEC.
- Dropped exim-enable_ecdh_openssl.patch as included in upstream

OBS-URL: https://build.opensuse.org/request/show/335998
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=171
2015-10-12 20:32:07 +00:00
Lars Müller
645ea49799 - Install fitting eximstats.conf depending on SUSE version; (bsc#926861).
- Add attribute dir to /etc/apache2 and /etc/apache2/conf.d in the file list.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=164
2015-04-17 16:29:46 +00:00
Lars Müller
ca1e0198e0 Set CFLAGS_OPT_WERROR only on post-5 CentOS and RHEL systems.
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=160
2015-01-24 23:07:35 +00:00
Lars Müller
e5a0307296 Drop BuildRequires xorg-x11-server-sdk for non SUSE systems in particular to
build on RHEL 6 again.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=159
2015-01-24 22:36:10 +00:00
Lars Müller
9cbf4ddd30 Let ld know the path to mysqlclient.
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=158
2015-01-24 22:17:02 +00:00
Lars Müller
4040bfe97f - update to 4.85
See doc/ChangeLog from the main tar ball or the exim file for
  more details.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=157
2015-01-24 19:56:27 +00:00
Tomáš Chvátal
8642790a1a Accepting request 280598 from home:-miska-:arm
Add support for spf, mysql and other small fixes

OBS-URL: https://build.opensuse.org/request/show/280598
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=156
2015-01-12 16:44:39 +00:00
Lars Müller
fa3c7698ca Removed executable permission bits from exim.service file.
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=154
2014-12-05 12:49:45 +00:00
Lars Müller
ba0024da3a Remove dependency on gpg-offline as signature checking is implemented in the
source validator.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=152
2014-11-26 14:42:09 +00:00
Lars Müller
4029445955 - update to 4.84
+ Re-add a 'return NULL' to silence complaints from static checkers that
    were complaining about end of non-void function with no return;
	 (beo#1506); obsoletes silence-static-checkers.patch.
  + Fix parsing of quoted parameter values in MIME headers.
    This was a regression intruduced in 4.83 by another bugfix; (beo#1513).
  + Fix broken compilation when EXPERIMENTAL_DSN is enabled.
  + Fix exipick for enhanced spoolfile specification used when
    EXPERIMENTAL_DNS is enabled; (beo#1509).

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=151
2014-11-26 14:16:35 +00:00
Lars Müller
ff1c93e649 Add an empty line to better visually separate %postun from %verifyscript.
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=149
2014-08-12 14:45:40 +00:00
Lars Müller
9cfe82e2e1 Accepting request 244338 from home:posophe:branches:server:mail
OBS-URL: https://build.opensuse.org/request/show/244338
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=148
2014-08-12 14:24:43 +00:00
Lars Müller
2c1ef50fea Remove duplicate _beo1506 from the patch filename.
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=146
2014-07-25 13:32:59 +00:00
Lars Müller
0ec4735cff Merge feedback from upstream and modify the package change log to:
Silence static checkers; (beo#1506).

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=142
2014-07-23 18:20:48 +00:00
Lars Müller
72254c2535 Add no-return-in-find_variable.patch; (beo#1506).
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=141
2014-07-23 13:19:52 +00:00
Lars Müller
399233b85e - update to 4.83
This release of Exim includes one incompatible fix:
  + the behavior of expansion of arguments to math comparison functions
    (<, <=, =, =>, >) was unexpected, expanding the values twice;
    CVE-2014-2972; (bnc#888520)
  This release contains the following enhancements and bugfixes:
  + PRDR was promoted from Experimental to mainline
  + OCSP Stapling was promoted from Experimental to mainline
  + new Experimental feature Proxy Protocol
  + new Experimental feature DSN (Delivery Status Notifications)
  + TLS session improvements
  + TLS SNI fixes
  + LDAP enhancements
  + DMARC fixes (previous CVE-2014-2957) and new $dmarc_domain_policy
  + several new operations (listextract, utf8clean, md5, sha1)
  + enforce header formatting with verify=header_names_ascii
  + new commandline option -oMm
  + new TLSA dns lookup
  + new malware "sock" type
  + cutthrough routing enhancements
  + logging enhancements
  + DNSSEC enhancements
  + exiqgrep enhancements
  + deprecating non-standard SPF results
  + build and portability fixes
  + documentation fixes and enhancements
- Verify source tar ball gpg signature.
- Refresh exim-enable_ecdh_openssl.patch and strip version number from the
  patch filename.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=140
2014-07-23 12:09:00 +00:00
Lars Müller
59830b8282 Accepting request 215000 from home:msmeissn:branches:server:mail
- exim482-enable_ecdh_openssl.patch: Enable ECDH (elliptic curve diffie
  hellman) support, taken from http://bugs.exim.org/show_bug.cgi?id=1397

OBS-URL: https://build.opensuse.org/request/show/215000
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=138
2014-01-24 12:22:44 +00:00
Lars Müller
9bbc6546a2 - BuildRequire libopenssl-devel only on SUSE systems.
- Fix suse_version condition of the pre- and postun and scriptlet.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=135
2013-12-06 18:47:11 +00:00
Lars Müller
04212f0278 Call service_add_pre from pre scriptlet on post-12.2 systems.
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=134
2013-12-06 18:10:24 +00:00
Lars Müller
a00d96c7bc update to 4.82
See the package change log for all the details.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=133
2013-12-06 17:51:14 +00:00
Lars Müller
bfff3f2a71 - Replace >= 1230 by > 1220 as this type of condition is used anywhere else in
the exim spec file.
- Remove a trailing while space from the spec file.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=131
2013-11-06 14:26:33 +00:00
Lars Müller
47d42dea31 Accepting request 204919 from home:posophe:branches:server:mail
Add systemd support for openSUSE >= 12.3

OBS-URL: https://build.opensuse.org/request/show/204919
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=130
2013-11-06 14:19:55 +00:00
Dr. Werner Fink
02958eb5f8 Accepting request 179120 from home:jengelh:db6
- exim.spec forces the use of SSL libraries,
  so make sure the BuildRequires are there.
  Also add previously implicit cyrus-sasl back.

OBS-URL: https://build.opensuse.org/request/show/179120
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=128
2013-06-16 13:24:21 +00:00
Lars Müller
3cd32e0e68 Execute the run_permissions macro on pre-11.4 systems and else the
set_permission one if available; (bnc#764120).

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=126
2013-01-09 19:55:32 +00:00
Lars Müller
9569f69bfe - update to 4.80.1
- SECURITY: protect DKIM DNS decoding from remote exploit; CVE-2012-5671;
    (bnc#786652).

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=124
2012-10-26 09:29:39 +00:00
Lars Müller
5861db2a32 - update to 4.80
- Bugzilla 949 - Documentation tweak.
  - Bugzilla 1093 - eximstats DATA reject detection regexps improved.
  - Bugzilla 1169 - primary_hostname spelling was incorrect in docs.
  - Implemented gsasl authenticator.
  - Implemented heimdal_gssapi authenticator with "server_keytab" option.
  - Local/Makefile support for (AUTH|LOOKUP)_*_PC=foo to use
    `pkg-config foo` for cflags/libs.
  - Swapped $auth1/$auth2 for gsasl GSSAPI mechanism, to be more consistent
    with rest of GSASL and with heimdal_gssapi.
  - Local/Makefile support for USE_(GNUTLS|OPENSSL)_PC=foo to use
    `pkg-config foo` for cflags/libs for the TLS implementation.
  - New expansion variable $tls_bits; Cyrus SASL server connection
    properties get this fed in as external SSF.  A number of robustness
    and debugging improvements to the cyrus_sasl authenticator.
  - cyrus_sasl server now expands the server_realm option.
  - Bugzilla 1214 - Log authentication information in reject log.
  - Added dbmjz lookup type.
  - Let heimdal_gssapi authenticator take a SASL message without an authzid.
  - MAIL args handles TAB as well as SP, for better interop with
    non-compliant senders.
  - Bugzilla 1237 - fix cases where printf format usage not indicated.
  - tls_peerdn now print-escaped for spool files.
    Observed some $tls_peerdn in wild which contained \n, which resulted
    in spool file corruption.
  - TLS fixes for OpenSSL: support TLS 1.1 & 1.2; new "openssl_options"
    values; set SSL_MODE_AUTO_RETRY so that OpenSSL will retry a read
    or write after TLS renegotiation, which otherwise led to messages
    "Got SSL error 2".
  - Bugzilla 1239 - fix DKIM verification when signature was not inserted
    as a tracking header (ie: a signed header comes before the signature).
  - Bugzilla 660 - Multi-valued attributes from ldap now parseable as a
    comma-sep list; embedded commas doubled.
  - Refactored ACL "verify =" logic to table-driven dispatch.
  - LDAP: Check for errors of TLS initialisation, to give correct diagnostics.
  - Removed "dont_insert_empty_fragments" fron "openssl_options".
    Removed SSL_clear() after SSL_new() which led to protocol negotiation
    failures.  We appear to now support TLS1.1+ with Exim.
  - OpenSSL: new expansion var $tls_sni, which if used in tls_certificate
    lets Exim select keys and certificates based upon TLS SNI from client.
    Also option tls_sni on SMTP Transports.  Also clear $tls_bits correctly
    before an outbound SMTP session.  New log_selector, +tls_sni.
  - Bugzilla 1122 - check localhost_number expansion for failure, avoid
    NULL dereference.
  - Revert part of NM/04, it broke log_path containing %D expansions.
    Left warnings.  Added "eximon gdb" invocation mode.
  - Defaulting "accept_8bitmime" to true, not false.
  - Added -bw for inetd wait mode support.
  - Added PCRE_CONFIG=yes support to Makefile for using pcre-config to
    locate the relevant includes and libraries.  Made this the default.
  - Fixed headers_only on smtp transports (was not sending trailing dot).
    Bugzilla 1246, report and most of solution from Tomasz Kusy.
  - ${eval } now uses 64-bit and supports a "g" suffix (like to "k" and "m").
    This may cause build issues on older platforms.
  - Revamped GnuTLS support, passing tls_require_ciphers to
    gnutls_priority_init, ignoring Exim options gnutls_require_kx,
    gnutls_require_mac & gnutls_require_protocols (no longer supported).
    Added SNI support via GnuTLS too.
    Made ${randint:..} supplier available, if using not-too-old GnuTLS.
  - Added EXPERIMENTAL_OCSP for OpenSSL.
  - Applied dnsdb SPF support patch from Janne Snabb.
    Applied second patch from Janne, implementing suggestion to default
    multiple-strings-in-record handling to match SPF spec.
  - Added expansion variable $tod_epoch_l for a higher-precision time.
  - Fix DCC dcc_header content corruption (stack memory referenced,
    read-only, out of scope).
    Patch from Wolfgang Breyha, report from Stuart Northfield.
  - Fix three issues highlighted by clang analyser static analysis.
    Only crash-plausible issue would require the Cambridge-specific
    iplookup router and a misconfiguration.
    Report from Marcin Mirosław.
  - Another attempt to deal with PCRE_PRERELEASE, this one less buggy.
  - %D in printf continues to cause issues (-Wformat=security), so for
    now guard some of the printf checks behind WANT_DEEPER_PRINTF_CHECKS.
    As part of this, removing so much warning spew let me fix some minor
    real issues in debug logging.
  - GnuTLS was always using default tls_require_ciphers, due to a missing
    assignment on my part.  Fixed.
  - Added tls_dh_max_bits option, defaulting to current hard-coded limit
    of NSS, for GnuTLS/NSS interop.
  - Validate tls_require_ciphers on startup, since debugging an invalid
    string otherwise requires a connection and a bunch more work and it's
    relatively easy to get wrong.  Should also expose TLS library linkage
    problems.
  - Pull in <features.h> on Linux, for some portability edge-cases of
    64-bit ${eval} (JH/03).
  - Define _GNU_SOURCE in exim.h; it's needed for some releases of
    protection layer was required, which is not implemented.  Bugzilla 1254
  - Overhaul DH prime handling, supply RFC-specified DH primes as built
    into Exim, default to IKE id 23 from RFC 5114 (2048 bit).  Make
    tls_dhparam take prime identifiers.  Also unbreak combination of
    OpenSSL+DH_params+TLSSNI.
  - Disable SSLv2 by default in OpenSSL support.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=122
2012-08-19 14:12:43 +00:00
Lars Müller
f6dea5e9e9 Fix typo in CFLAGS_OPT_WERROR variable name.
OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=119
2012-03-17 20:16:14 +00:00
Lars Müller
bedf5a3bc8 Disable format-security and missing-format-attribute warnings via CFLAGS on
pre-11.2 systems.

OBS-URL: https://build.opensuse.org/package/show/server:mail/exim?expand=0&rev=118
2012-03-17 20:08:07 +00:00