From e20909a770f206f9598dd21f0514f4dcfa3c0283 Mon Sep 17 00:00:00 2001 From: Patrick J Volkerding Date: Tue, 30 Aug 2022 19:39:30 +0000 Subject: Tue Aug 30 19:39:30 UTC 2022 a/cryptsetup-2.5.0-x86_64-3.txz: Rebuilt. rc.luks: use --batch-mode when creating encrypted swap. Thanks to Markus Wiesner. a/sysvinit-3.05-x86_64-1.txz: Upgraded. ap/vim-9.0.0334-x86_64-1.txz: Upgraded. Fixed use after free. Thanks to marav for the heads-up. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3016 (* Security fix *) kde/digikam-7.8.0-x86_64-1.txz: Upgraded. kde/fcitx5-configtool-5.0.15-x86_64-1.txz: Upgraded. kde/umbrello-22.08.0-x86_64-2.txz: Rebuilt. Recompiled against kdevelop-22.08.0. Thanks to th_r. x/fcitx5-5.0.19-x86_64-1.txz: Upgraded. x/fcitx5-chinese-addons-5.0.15-x86_64-1.txz: Upgraded. x/libime-1.0.14-x86_64-1.txz: Upgraded. xap/NetworkManager-openvpn-1.10.0-x86_64-1.txz: Upgraded. xap/mozilla-firefox-104.0.1-x86_64-1.txz: Upgraded. This is a bugfix release. For more information, see: https://www.mozilla.org/en-US/firefox/104.0.1/releasenotes/ xap/vim-gvim-9.0.0334-x86_64-1.txz: Upgraded. extra/sendmail/sendmail-8.17.1-x86_64-5.txz: Rebuilt. Patched sendmail.h to fix SASL auth. Thanks to af7567. Build without -DUSE_EAI (which is evidently considered experimental) since the option breaks the vacation binary. Thanks to bitfuzzy and HQuest. It is possible that this could work but requires additional options. I found this in the ChangeLog for the SUSE rpm: Experimental support for SMTPUTF8 (EAI, see RFC 6530-6533) is available when using the compile time option USE_EAI (see also devtools/Site/site.config.m4.sample for other required settings) and the cf option SMTPUTF8. If a mail submission via the command line requires the use of SMTPUTF8, e.g., because a header uses UTF-8 encoding, but the addresses on the command line are all ASCII, then the new option -U must be used, and the cf option SMTPUTF8 must be set in submit.cf. Any assistance with getting -DUSE_EAI working properly would be appreciated. extra/sendmail/sendmail-cf-8.17.1-noarch-5.txz: Rebuilt. --- extra/source/sendmail/SlackBuild-sendmail | 5 ++++- extra/source/sendmail/SlackBuild-sendmail-cf | 2 +- extra/source/sendmail/sendmail.sasl.auth.fix.patch | 21 +++++++++++++++++++++ extra/source/sendmail/site.config.m4 | 2 +- 4 files changed, 27 insertions(+), 3 deletions(-) create mode 100644 extra/source/sendmail/sendmail.sasl.auth.fix.patch (limited to 'extra') diff --git a/extra/source/sendmail/SlackBuild-sendmail b/extra/source/sendmail/SlackBuild-sendmail index d0a4a1397..71f1a39f7 100755 --- a/extra/source/sendmail/SlackBuild-sendmail +++ b/extra/source/sendmail/SlackBuild-sendmail @@ -21,7 +21,7 @@ # ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. VERSION=8.17.1 -BUILD=${BUILD:-4} +BUILD=${BUILD:-5} # Automatically determine the architecture we're building on: if [ -z "$ARCH" ]; then @@ -79,6 +79,9 @@ find . \ \( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \ -exec chmod 644 {} \; +# Patch from FreeBSD to fix SASL auth: +zcat $CWD/sendmail.sasl.auth.fix.patch.gz | patch -p0 --verbose || exit 1 + # Add TLS support to the sendmail binary: cat $CWD/site.config.m4 > devtools/Site/site.config.m4 diff --git a/extra/source/sendmail/SlackBuild-sendmail-cf b/extra/source/sendmail/SlackBuild-sendmail-cf index 10a98917e..77a1a5c39 100755 --- a/extra/source/sendmail/SlackBuild-sendmail-cf +++ b/extra/source/sendmail/SlackBuild-sendmail-cf @@ -22,7 +22,7 @@ VERSION=8.17.1 ARCH=noarch -BUILD=${BUILD:-4} +BUILD=${BUILD:-5} CWD=$(pwd) TMP=${TMP:-/tmp} diff --git a/extra/source/sendmail/sendmail.sasl.auth.fix.patch b/extra/source/sendmail/sendmail.sasl.auth.fix.patch new file mode 100644 index 000000000..2701fc349 --- /dev/null +++ b/extra/source/sendmail/sendmail.sasl.auth.fix.patch @@ -0,0 +1,21 @@ +--- sendmail/sendmail.h.orig 2022-04-19 21:07:42 UTC ++++ sendmail/sendmail.h +@@ -760,7 +760,7 @@ extern bool filesys_free __P((long)); + # define SASL_IS_AUTH 2 /* authenticated */ + + /* SASL options */ +-# define SASL_AUTH_AUTH 0x1000 /* use auth= only if authenticated */ ++# define SASL_AUTH_AUTH 0x10000 /* use auth= only if authenticated */ + # if SASL >= 20101 + # define SASL_SEC_MASK SASL_SEC_MAXIMUM /* mask for SASL_SEC_* values: sasl.h */ + # else /* SASL >= 20101 */ +@@ -775,6 +775,9 @@ extern bool filesys_free __P((long)); + # endif /* SASL_SEC_NOPLAINTEXT & SASL_SEC_MASK) == 0 ... */ + # endif /* SASL >= 20101 */ + # define MAXOUTLEN 8192 /* length of output buffer, should be 2^n */ ++# if (SASL_AUTH_AUTH & SASL_SEC_MASK) != 0 ++# ERROR "change SASL_AUTH_AUTH notify sendmail.org!" ++# endif + + /* functions */ + extern char *intersect __P((char *, char *, SM_RPOOL_T *)); diff --git a/extra/source/sendmail/site.config.m4 b/extra/source/sendmail/site.config.m4 index 1142d2c7c..36a692f6b 100644 --- a/extra/source/sendmail/site.config.m4 +++ b/extra/source/sendmail/site.config.m4 @@ -2,5 +2,5 @@ APPENDDEF(`confMAPDEF', `-DNEWDB') APPENDDEF(`confLIBS', `-lnsl -lssl -lcrypto -lsasl2 -lwrap -lm -ldb -lresolv -licui18n -licuuc -licudata') APPENDDEF(`conf_libmilter_ENVDEF', `-DMILTER') APPENDDEF(`conf_sendmail_ENVDEF', `-DMILTER') -APPENDDEF(`confENVDEF', `-DNETINET6 -DHAS_GETHOSTBYNAME2=1 -DNEWDB -DSTARTTLS -DDANE -DSASL=2 -DTCPWRAPPERS -DNIS -DMAP_REGEX -DSOCKETMAP -DTLS_EC -DUSE_EAI')dnl +APPENDDEF(`confENVDEF', `-DNETINET6 -DHAS_GETHOSTBYNAME2=1 -DNEWDB -DSTARTTLS -DDANE -DSASL=2 -DTCPWRAPPERS -DNIS -DMAP_REGEX -DSOCKETMAP -DTLS_EC')dnl -- cgit v1.2.3