Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package opendkim for openSUSE:Factory 
checked in at 2023-10-13 23:15:03
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/opendkim (Old)
 and      /work/SRC/openSUSE:Factory/.opendkim.new.20540 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "opendkim"

Fri Oct 13 23:15:03 2023 rev:8 rq:1117542 version:unknown

Changes:
--------
--- /work/SRC/openSUSE:Factory/opendkim/opendkim.changes        2021-11-06 
18:21:25.560993561 +0100
+++ /work/SRC/openSUSE:Factory/.opendkim.new.20540/opendkim.changes     
2023-10-13 23:16:08.134202388 +0200
@@ -1,0 +2,8 @@
+Fri Oct 13 00:17:48 UTC 2023 - Ferdinand Thiessen <r...@fthiessen.de>
+
+- Add fix-RSA_sign-call.patch
+  * Fix bsc#1216117
+  * Fix call of RSA sign on big endian systems, patch origin:
+    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506
+
+-------------------------------------------------------------------

New:
----
  fix-RSA_sign-call.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ opendkim.spec ++++++
--- /var/tmp/diff_new_pack.MBKvo6/_old  2023-10-13 23:16:09.102237500 +0200
+++ /var/tmp/diff_new_pack.MBKvo6/_new  2023-10-13 23:16:09.102237500 +0200
@@ -46,15 +46,17 @@
 Source3:        opendkim.service
 Source4:        opendkim.tmpfiles.d
 Source5:        opendkim.init
-# PATCH-FIX-UPSTREAM fix compiler warnings
+# PATCH-FIX-UPSTREAM opendkim-2.9.2_compiler_warnings.patch -- fix compiler 
warnings
 Patch0:         opendkim-2.9.2_compiler_warnings.patch
 # PATCH-FIX-OPENSUSE set default values in installed configuration file
 Patch1:         %{name}-default_config.patch
-# PATCH-FIX-UPSTREAM LIBOPENDKIM: Confirm that the value of "d=" is properly 
formed.
+# PATCH-FIX-UPSTREAM cve-2020-12272.patch -- LIBOPENDKIM: Confirm that the 
value of "d=" is properly formed.
 Patch2:         cve-2020-12272.patch
-# PATCH-FIX-UPSTREAM  Plug memory leak in Unbound callback function 
https://github.com/trusteddomainproject/OpenDKIM/pull/57/commits/0010ca7150b09c3c259c17bdd9431a8bfe39e299
+# PATCH-FIX-UPSTREAM unbound-fix.patch -- Plug memory leak in Unbound callback 
function 
https://github.com/trusteddomainproject/OpenDKIM/pull/57/commits/0010ca7150b09c3c259c17bdd9431a8bfe39e299
 Patch3:         unbound-fix.patch
 Patch4:         harden_opendkim.service.patch
+# PATCH-FIX-UPSTREAM fix-RSA_sign-call.patch -- Fix RSA sign call on big 
endian systems ref: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506
+Patch5:         fix-RSA_sign-call.patch
 BuildRequires:  autoconf
 BuildRequires:  automake
 BuildRequires:  curl-devel
@@ -218,6 +220,7 @@
 %patch2 -p1
 %patch3 -p0
 %patch4 -p1
+%patch5 -p1
 
 %build
 autoreconf -iv

++++++ fix-RSA_sign-call.patch ++++++
--- a/libopendkim/dkim.c
+++ b/libopendkim/dkim.c
@@ -3932,6 +3932,7 @@ dkim_eom_sign(DKIM *dkim)
          {
                int nid;
                struct dkim_crypto *crypto;
+               unsigned int ui_l = 0;
 
                crypto = (struct dkim_crypto *) sig->sig_signature;
 
@@ -3942,9 +3943,11 @@ dkim_eom_sign(DKIM *dkim)
                    sig->sig_hashtype == DKIM_HASHTYPE_SHA256)
                        nid = NID_sha256;
 
+               /* use variable ui_l to savely get the length (unsigned int *) 
out of RSA_sign and into size_t type l */
                status = RSA_sign(nid, digest, diglen,
-                                 crypto->crypto_out, (int *) &l,
+                                 crypto->crypto_out, &ui_l,
                                  crypto->crypto_key);
+               l = ui_l;
                if (status != 1 || l == 0)
                {
                        dkim_load_ssl_errors(dkim, 0);

Reply via email to