Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package opendkim for openSUSE:Factory checked in at 2023-10-13 23:15:03 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/opendkim (Old) and /work/SRC/openSUSE:Factory/.opendkim.new.20540 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "opendkim" Fri Oct 13 23:15:03 2023 rev:8 rq:1117542 version:unknown Changes: -------- --- /work/SRC/openSUSE:Factory/opendkim/opendkim.changes 2021-11-06 18:21:25.560993561 +0100 +++ /work/SRC/openSUSE:Factory/.opendkim.new.20540/opendkim.changes 2023-10-13 23:16:08.134202388 +0200 @@ -1,0 +2,8 @@ +Fri Oct 13 00:17:48 UTC 2023 - Ferdinand Thiessen <r...@fthiessen.de> + +- Add fix-RSA_sign-call.patch + * Fix bsc#1216117 + * Fix call of RSA sign on big endian systems, patch origin: + https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506 + +------------------------------------------------------------------- New: ---- fix-RSA_sign-call.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ opendkim.spec ++++++ --- /var/tmp/diff_new_pack.MBKvo6/_old 2023-10-13 23:16:09.102237500 +0200 +++ /var/tmp/diff_new_pack.MBKvo6/_new 2023-10-13 23:16:09.102237500 +0200 @@ -46,15 +46,17 @@ Source3: opendkim.service Source4: opendkim.tmpfiles.d Source5: opendkim.init -# PATCH-FIX-UPSTREAM fix compiler warnings +# PATCH-FIX-UPSTREAM opendkim-2.9.2_compiler_warnings.patch -- fix compiler warnings Patch0: opendkim-2.9.2_compiler_warnings.patch # PATCH-FIX-OPENSUSE set default values in installed configuration file Patch1: %{name}-default_config.patch -# PATCH-FIX-UPSTREAM LIBOPENDKIM: Confirm that the value of "d=" is properly formed. +# PATCH-FIX-UPSTREAM cve-2020-12272.patch -- LIBOPENDKIM: Confirm that the value of "d=" is properly formed. Patch2: cve-2020-12272.patch -# PATCH-FIX-UPSTREAM Plug memory leak in Unbound callback function https://github.com/trusteddomainproject/OpenDKIM/pull/57/commits/0010ca7150b09c3c259c17bdd9431a8bfe39e299 +# PATCH-FIX-UPSTREAM unbound-fix.patch -- Plug memory leak in Unbound callback function https://github.com/trusteddomainproject/OpenDKIM/pull/57/commits/0010ca7150b09c3c259c17bdd9431a8bfe39e299 Patch3: unbound-fix.patch Patch4: harden_opendkim.service.patch +# PATCH-FIX-UPSTREAM fix-RSA_sign-call.patch -- Fix RSA sign call on big endian systems ref: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012506 +Patch5: fix-RSA_sign-call.patch BuildRequires: autoconf BuildRequires: automake BuildRequires: curl-devel @@ -218,6 +220,7 @@ %patch2 -p1 %patch3 -p0 %patch4 -p1 +%patch5 -p1 %build autoreconf -iv ++++++ fix-RSA_sign-call.patch ++++++ --- a/libopendkim/dkim.c +++ b/libopendkim/dkim.c @@ -3932,6 +3932,7 @@ dkim_eom_sign(DKIM *dkim) { int nid; struct dkim_crypto *crypto; + unsigned int ui_l = 0; crypto = (struct dkim_crypto *) sig->sig_signature; @@ -3942,9 +3943,11 @@ dkim_eom_sign(DKIM *dkim) sig->sig_hashtype == DKIM_HASHTYPE_SHA256) nid = NID_sha256; + /* use variable ui_l to savely get the length (unsigned int *) out of RSA_sign and into size_t type l */ status = RSA_sign(nid, digest, diglen, - crypto->crypto_out, (int *) &l, + crypto->crypto_out, &ui_l, crypto->crypto_key); + l = ui_l; if (status != 1 || l == 0) { dkim_load_ssl_errors(dkim, 0);