Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package postfix for openSUSE:Factory checked in at 2021-07-29 21:31:10 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/postfix (Old) and /work/SRC/openSUSE:Factory/.postfix.new.1899 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "postfix" Thu Jul 29 21:31:10 2021 rev:206 rq:908570 version:3.6.2 Changes: -------- --- /work/SRC/openSUSE:Factory/postfix/postfix-bdb.changes 2021-07-09 23:56:55.929647654 +0200 +++ /work/SRC/openSUSE:Factory/.postfix.new.1899/postfix-bdb.changes 2021-07-29 21:31:44.384787634 +0200 @@ -1,0 +2,66 @@ +Mon Jul 26 19:59:12 UTC 2021 - Peter Varkoly <vark...@suse.com> + +- Syntax error in config.postfix + (bsc#1188477) + +------------------------------------------------------------------- +Sun Jul 25 23:22:23 UTC 2021 - Michael Str??der <mich...@stroeder.com> + +- Update to 3.6.2 + * In Postfix 3.6, fixed a false "Result too large" (ERANGE) fatal + error in the compatibility_level parser, because there was no + 'errno = 0' statement before an strtol() call. + * (problem introduced in Postfix 3.3) "Null pointer read" error + in the cleanup daemon when "header_from_format = standard" (the + default as of Postfix 3.3), and email was submitted with + /usr/sbin/sendmail without From: header, and an all-space full + name was specified in 1) the password file, 2) with "sendmail + -F", or 3) with the NAME environment variable. Found by Renaud + Metrich. + * (problem introduced in Postfix 2.4) False "too many reverse + jump" warnings in the showq daemon, because loop detection code + was comparing memory addresses instead of queue file names. + Reported by Mehmet Avcioglu. + * (problem introduced in 1999) The Postfix SMTP server was sending + all session transcripts to the error_notice_recipient (default: + postmaster), instead of sending transcripts of bounced mail to + the bounce_notice_recipient (default: postmaster). Reported by + Hans van Zijst. + * The texthash: map implementation broke tls_server_sni_maps, + because it did not support multi-file inputs. Reported by + Christopher Gurnee, who also found an instance of the missing + code in the "postmap -F" source code. File: util/dict_thash.c. + +------------------------------------------------------------------- +Wed Jul 14 14:37:24 UTC 2021 - Peter Varkoly <vark...@suse.com> + +- spamd wants to start before mail-transfer-agent.target, but that target doesn't exist + (bsc#1066854) + +------------------------------------------------------------------- +Tue Jul 6 22:23:17 UTC 2021 - Christian Wittmer <ch...@computersalat.de> + +- postfix-SUSE + * rework sysconfig.postfix, add + - POSTFIX_WITH_DKIM + - POSTFIX_DKIM_CONN + * rework config.postfix for main.cf + - with_dkim +- update postfix-main.cf.patch + * add OpenDKIM settings + +------------------------------------------------------------------- +Wed Jun 23 22:28:52 UTC 2021 - Christian Wittmer <ch...@computersalat.de> + +- postfix-mysql + * add mysql_relay_recipient_maps.cf +- postfix-SUSE + * rework sysconfig.postfix, add + - POSTFIX_RELAY_RECIPIENTS + - POSTFIX_BACKUPMX + * add relay_recipients + * rework config.postfix for main.cf + - is_backupmx + - relay_recipient_maps + +------------------------------------------------------------------- @@ -18,0 +85,9 @@ + +------------------------------------------------------------------- +Sun Jun 6 12:51:35 UTC 2021 - Christian Wittmer <ch...@computersalat.de> + +- fix postfix-master.cf.patch + * set correct indentation (again) for options of + - submission (needs 3 spaces) + - smtps (needs 4 spaces) + to make config.postfix work nicely again --- /work/SRC/openSUSE:Factory/postfix/postfix.changes 2021-07-22 22:42:41.215252477 +0200 +++ /work/SRC/openSUSE:Factory/.postfix.new.1899/postfix.changes 2021-07-29 21:31:44.416787595 +0200 @@ -1,0 +2,34 @@ +Mon Jul 26 19:59:12 UTC 2021 - Peter Varkoly <vark...@suse.com> + +- Syntax error in config.postfix + (bsc#1188477) + +------------------------------------------------------------------- +Sun Jul 25 23:22:23 UTC 2021 - Michael Str??der <mich...@stroeder.com> + +- Update to 3.6.2 + * In Postfix 3.6, fixed a false "Result too large" (ERANGE) fatal + error in the compatibility_level parser, because there was no + 'errno = 0' statement before an strtol() call. + * (problem introduced in Postfix 3.3) "Null pointer read" error + in the cleanup daemon when "header_from_format = standard" (the + default as of Postfix 3.3), and email was submitted with + /usr/sbin/sendmail without From: header, and an all-space full + name was specified in 1) the password file, 2) with "sendmail + -F", or 3) with the NAME environment variable. Found by Renaud + Metrich. + * (problem introduced in Postfix 2.4) False "too many reverse + jump" warnings in the showq daemon, because loop detection code + was comparing memory addresses instead of queue file names. + Reported by Mehmet Avcioglu. + * (problem introduced in 1999) The Postfix SMTP server was sending + all session transcripts to the error_notice_recipient (default: + postmaster), instead of sending transcripts of bounced mail to + the bounce_notice_recipient (default: postmaster). Reported by + Hans van Zijst. + * The texthash: map implementation broke tls_server_sni_maps, + because it did not support multi-file inputs. Reported by + Christopher Gurnee, who also found an instance of the missing + code in the "postmap -F" source code. File: util/dict_thash.c. + +------------------------------------------------------------------- Old: ---- postfix-3.6.1.tar.gz postfix-3.6.1.tar.gz.asc New: ---- postfix-3.6.2.tar.gz postfix-3.6.2.tar.gz.asc ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ postfix-bdb.spec ++++++ --- /var/tmp/diff_new_pack.OIbCBA/_old 2021-07-29 21:31:45.176786659 +0200 +++ /var/tmp/diff_new_pack.OIbCBA/_new 2021-07-29 21:31:45.176786659 +0200 @@ -56,7 +56,7 @@ %endif %bcond_without ldap Name: postfix-bdb -Version: 3.6.1 +Version: 3.6.2 Release: 0 Summary: A fast, secure, and flexible mailer License: IPL-1.0 OR EPL-2.0 ++++++ postfix.spec ++++++ --- /var/tmp/diff_new_pack.OIbCBA/_old 2021-07-29 21:31:45.204786625 +0200 +++ /var/tmp/diff_new_pack.OIbCBA/_new 2021-07-29 21:31:45.208786619 +0200 @@ -42,7 +42,7 @@ %bcond_without libnsl %bcond_without ldap Name: postfix -Version: 3.6.1 +Version: 3.6.2 Release: 0 Summary: A fast, secure, and flexible mailer License: IPL-1.0 OR EPL-2.0 ++++++ postfix-3.6.1.tar.gz -> postfix-3.6.2.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/postfix-3.6.1/HISTORY new/postfix-3.6.2/HISTORY --- old/postfix-3.6.1/HISTORY 2021-06-13 20:47:56.000000000 +0200 +++ new/postfix-3.6.2/HISTORY 2021-07-25 00:41:41.000000000 +0200 @@ -25571,3 +25571,44 @@ Typo (introduced: Postfix 3.4): silent_discard should be silent-discard. File: proto/BDAT_README.html. + +20210615 + + Bugfix (introduced: Postfix 3.4): the texthash: map + implementation did not support "postmap -F" behavior. + Reported by Christopher Gurnee, who also found the missing + code in the postmap source. File: util/dict_thash.c. + +20210623 + + Bugfix (introduced: Postfix 3.6) false "Result too large" + (ERANGE) fatal errors in the compatibility_level parser, + because an strtol() call had no 'errno = 0' statement before + the call. Also fixed two older latent bugs of the same kind. + Problem reported by David Bohman. Files: global/compat_level.c, + postscreen/postscreen_tests.c, util/mac_expand.c. + +20210705 + + Bugfix (introduced: Postfix 3.3): "null pointer read" error + in the cleanup daemon when "header_from_format = standard" + (the default as of Postfix 3.3) and email was submitted + with /usr/sbin/sendmail without From: header, and an all-space + full name was specified in 1) the password file, 2) with + "sendmail -F", or 3) with the NAME environment variable. + Found by Renaud Metrich. File: cleanup/cleanup_message.c. + +20210708 + + Bugfix (introduced: 1999): the Postfix SMTP server was + sending all session transcripts to the error_notice_recipient, + instead of sending transcripts of bounced mail to the + bounce_notice_recipient. File: smtpd/smtpd_chat.c. + +20210713 + + Bugfix (introduced: Postfix 2.4): false "too many reverse + jump" warnings in the showq daemon. The loop detection code + was comparing memory addresses instead of queue file names. + It now properly compares strings. Reported by Mehmet Avcioglu. + File: global/record.c. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/postfix-3.6.1/src/cleanup/cleanup_message.c new/postfix-3.6.2/src/cleanup/cleanup_message.c --- old/postfix-3.6.1/src/cleanup/cleanup_message.c 2019-11-10 00:23:23.000000000 +0100 +++ new/postfix-3.6.2/src/cleanup/cleanup_message.c 2021-07-08 00:09:51.000000000 +0200 @@ -776,9 +776,12 @@ } else { token = tok822_alloc(TOK822_QSTRING, state->fullname); } - tok822_externalize(state->temp2, token, TOK822_STR_NONE); - tok822_free(token); - vstring_sprintf_append(state->temp2, " <%s>", + if (token) { + tok822_externalize(state->temp2, token, TOK822_STR_NONE); + tok822_free(token); + vstring_strcat(state->temp2, " "); + } + vstring_sprintf_append(state->temp2, "<%s>", vstring_str(state->temp1)); break; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/postfix-3.6.1/src/global/compat_level.c new/postfix-3.6.2/src/global/compat_level.c --- old/postfix-3.6.1/src/global/compat_level.c 2021-04-19 19:40:46.000000000 +0200 +++ new/postfix-3.6.2/src/global/compat_level.c 2021-07-24 23:26:54.000000000 +0200 @@ -157,6 +157,7 @@ char *remainder; start = str; + errno = 0; major = strtol(start, &remainder, 10); if (start < remainder && (*remainder == 0 || *remainder == '.') && errno != ERANGE && GOOD_MAJOR(major)) { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/postfix-3.6.1/src/global/mail_version.h new/postfix-3.6.2/src/global/mail_version.h --- old/postfix-3.6.1/src/global/mail_version.h 2021-06-13 20:50:57.000000000 +0200 +++ new/postfix-3.6.2/src/global/mail_version.h 2021-07-25 01:16:27.000000000 +0200 @@ -20,8 +20,8 @@ * Patches change both the patchlevel and the release date. Snapshots have no * patchlevel; they change the release date only. */ -#define MAIL_RELEASE_DATE "20210613" -#define MAIL_VERSION_NUMBER "3.6.1" +#define MAIL_RELEASE_DATE "20210724" +#define MAIL_VERSION_NUMBER "3.6.2" #ifdef SNAPSHOT #define MAIL_VERSION_DATE "-" MAIL_RELEASE_DATE diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/postfix-3.6.1/src/global/record.c new/postfix-3.6.2/src/global/record.c --- old/postfix-3.6.1/src/global/record.c 2021-01-14 00:54:42.000000000 +0100 +++ new/postfix-3.6.2/src/global/record.c 2021-07-25 01:11:10.000000000 +0200 @@ -323,7 +323,7 @@ int rec_goto(VSTREAM *stream, const char *buf) { off_t offset; - static const char *saved_path; + static char *saved_path; static off_t saved_offset; static int reverse_count; @@ -338,8 +338,10 @@ */ #define REVERSE_JUMP_LIMIT 10000 - if (saved_path != VSTREAM_PATH(stream)) { - saved_path = VSTREAM_PATH(stream); + if (saved_path == 0 || strcmp(saved_path, VSTREAM_PATH(stream)) != 0) { + if (saved_path) + myfree(saved_path); + saved_path = mystrdup(VSTREAM_PATH(stream)); reverse_count = 0; saved_offset = 0; } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/postfix-3.6.1/src/postscreen/postscreen_tests.c new/postfix-3.6.2/src/postscreen/postscreen_tests.c --- old/postfix-3.6.1/src/postscreen/postscreen_tests.c 2021-02-17 01:07:26.000000000 +0100 +++ new/postfix-3.6.2/src/postscreen/postscreen_tests.c 2021-07-24 23:26:54.000000000 +0200 @@ -175,6 +175,7 @@ * at the time that the cache entry was written. */ for (sp = time_stamps; sp < time_stamps + PSC_TINDX_COUNT; sp++) { + errno = 0; *sp = strtoul(start, &cp, 10); if (*start == 0 || (*cp != '\0' && *cp != ';') || errno == ERANGE) *sp = PSC_TIME_STAMP_DISABLED; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/postfix-3.6.1/src/smtpd/smtpd.c new/postfix-3.6.2/src/smtpd/smtpd.c --- old/postfix-3.6.1/src/smtpd/smtpd.c 2021-04-19 00:07:09.000000000 +0200 +++ new/postfix-3.6.2/src/smtpd/smtpd.c 2021-07-24 23:43:57.000000000 +0200 @@ -1301,6 +1301,7 @@ int var_defer_code; int var_smtpd_err_sleep; int var_non_fqdn_code; +char *var_bounce_rcpt; char *var_error_rcpt; int var_smtpd_delay_reject; char *var_rest_classes; @@ -6431,6 +6432,7 @@ VAR_EOD_CHECKS, DEF_EOD_CHECKS, &var_eod_checks, 0, 0, VAR_MAPS_RBL_DOMAINS, DEF_MAPS_RBL_DOMAINS, &var_maps_rbl_domains, 0, 0, VAR_RBL_REPLY_MAPS, DEF_RBL_REPLY_MAPS, &var_rbl_reply_maps, 0, 0, + VAR_BOUNCE_RCPT, DEF_ERROR_RCPT, &var_bounce_rcpt, 1, 0, VAR_ERROR_RCPT, DEF_ERROR_RCPT, &var_error_rcpt, 1, 0, VAR_REST_CLASSES, DEF_REST_CLASSES, &var_rest_classes, 0, 0, VAR_CANONICAL_MAPS, DEF_CANONICAL_MAPS, &var_canonical_maps, 0, 0, diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/postfix-3.6.1/src/smtpd/smtpd_chat.c new/postfix-3.6.2/src/smtpd/smtpd_chat.c --- old/postfix-3.6.1/src/smtpd/smtpd_chat.c 2018-08-27 23:54:59.000000000 +0200 +++ new/postfix-3.6.2/src/smtpd/smtpd_chat.c 2021-07-24 23:43:57.000000000 +0200 @@ -316,7 +316,8 @@ #define INDENT 4 notice = post_mail_fopen_nowait(mail_addr_double_bounce(), - var_error_rcpt, + (state->error_mask & MAIL_ERROR_BOUNCE) ? + var_bounce_rcpt : var_error_rcpt, MAIL_SRC_MASK_NOTIFY, NULL_TRACE_FLAGS, SMTPUTF8_FLAG_NONE, NO_QUEUE_ID); if (notice == 0) { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/postfix-3.6.1/src/util/dict_thash.c new/postfix-3.6.2/src/util/dict_thash.c --- old/postfix-3.6.1/src/util/dict_thash.c 2017-12-27 23:29:45.000000000 +0100 +++ new/postfix-3.6.2/src/util/dict_thash.c 2021-06-14 22:20:18.000000000 +0200 @@ -46,6 +46,7 @@ /* Utility library. */ #include <msg.h> +#include <mymalloc.h> #include <iostuff.h> #include <vstring.h> #include <stringops.h> @@ -180,6 +181,24 @@ " is this an alias file?", path, lineno); /* + * Optionally treat the value as a filename, and replace the value + * with the BASE64-encoded content of the named file. + */ + if (dict_flags & DICT_FLAG_SRC_RHS_IS_FILE) { + VSTRING *base64_buf; + char *err; + + if ((base64_buf = dict_file_to_b64(dict, value)) == 0) { + err = dict_file_get_error(dict); + msg_warn("%s, line %d: %s: skipping this entry", + VSTREAM_PATH(fp), lineno, err); + myfree(err); + continue; + } + value = vstring_str(base64_buf); + } + + /* * Store the value under the key. Handle duplicates * appropriately. XXX Move this into dict_ht, but 1) that map * ignores duplicates by default and we would have to check that diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/postfix-3.6.1/src/util/mac_expand.c new/postfix-3.6.2/src/util/mac_expand.c --- old/postfix-3.6.1/src/util/mac_expand.c 2021-01-09 22:52:12.000000000 +0100 +++ new/postfix-3.6.2/src/util/mac_expand.c 2021-07-24 23:26:54.000000000 +0200 @@ -274,6 +274,7 @@ long result; char *remainder; + errno = 0; result = strtol(strval, &remainder, 10); if (*strval == 0 /* can't happen */ || *remainder != 0 || errno == ERANGE) msg_fatal("mac_exp_eval: bad conversion: %s", strval); ++++++ postfix-SUSE.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/postfix-SUSE/config.postfix new/postfix-SUSE/config.postfix --- old/postfix-SUSE/config.postfix 2021-07-07 00:14:50.322245382 +0200 +++ new/postfix-SUSE/config.postfix 2021-07-26 21:58:26.855861878 +0200 @@ -95,7 +95,7 @@ if [ "${POSTFIX_DKIM_CONN,,}" == 'socket' -a \ "${POSTFIX_WITH_DKIM,,}" != 'no' ]; then if [[ -f /etc/opendkim/opendkim.conf ]]; then - DKIM_SOCKET=$(awk -F':' '/^Socket(\s|\t)+local/ {print $2}' /etc/opendkim/opendkim + DKIM_SOCKET=$(awk -F':' '/^Socket(\s|\t)+local/ {print $2}' /etc/opendkim/opendkim) # support for old socket dir '/var/run' if [[ "${DKIM_SOCKET}" =~ ^/var/run ]]; then OLD_DKIM_SOCKET='true'