Hello community,

here is the log from the commit of package dovecot23 for openSUSE:Factory 
checked in at 2018-03-14 19:39:48
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/dovecot23 (Old)
 and      /work/SRC/openSUSE:Factory/.dovecot23.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "dovecot23"

Wed Mar 14 19:39:48 2018 rev:4 rq:586348 version:2.3.0.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/dovecot23/dovecot23.changes      2018-03-07 
10:39:51.243275430 +0100
+++ /work/SRC/openSUSE:Factory/.dovecot23.new/dovecot23.changes 2018-03-14 
19:40:11.210753321 +0100
@@ -1,0 +2,15 @@
+Tue Mar 13 10:40:48 UTC 2018 - [email protected]
+
+- Fix License tag.
+
+-------------------------------------------------------------------
+Wed Mar  7 12:25:51 UTC 2018 - [email protected]
+
+- added 23da0fa1b30cc11bcc1d467674a0950c527e9ff1.patch
+
+-------------------------------------------------------------------
+Wed Mar  7 12:10:44 UTC 2018 - [email protected]
+
+- update license to SPDX-3
+
+-------------------------------------------------------------------
@@ -24 +39 @@
-    attacker uses randomly generated SNI servernames.
+    attacker uses randomly generated SNI servernames. (boo#1082828)
@@ -30,0 +46 @@
+    (boo#1082826)
@@ -32 +48 @@
-    login process.
+    login process. (boo#1075608)

New:
----
  23da0fa1b30cc11bcc1d467674a0950c527e9ff1.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ dovecot23.spec ++++++
--- /var/tmp/diff_new_pack.BhY94t/_old  2018-03-14 19:40:12.970690805 +0100
+++ /var/tmp/diff_new_pack.BhY94t/_new  2018-03-14 19:40:13.002689668 +0100
@@ -134,8 +134,9 @@
 Patch:          dovecot-2.3.0-dont_use_etc_ssl_certs.patch
 Patch1:         dovecot-2.3.0-better_ssl_defaults.patch
 Patch2:         dovecot-2.3.0.1-over-quota-lmtp-crash.patch
+Patch3:         23da0fa1b30cc11bcc1d467674a0950c527e9ff1.patch
 Summary:        IMAP and POP3 Server Written Primarily with Security in Mind
-License:        BSD-3-Clause and LGPL-2.1+ and MIT
+License:        BSD-3-Clause AND LGPL-2.1-or-later AND MIT
 Group:          Productivity/Networking/Email/Servers
 
 %description
@@ -314,6 +315,7 @@
 %patch -p1
 %patch1 -p1
 %patch2 -p1
+%patch3 -p1
 gzip -9v ChangeLog
 # Fix plugins dir.
 sed -i 's|#mail_plugin_dir = /usr/lib/dovecot|mail_plugin_dir = 
%{_libdir}/dovecot/modules|' doc/example-config/conf.d/10-mail.conf

++++++ 23da0fa1b30cc11bcc1d467674a0950c527e9ff1.patch ++++++
>From 23da0fa1b30cc11bcc1d467674a0950c527e9ff1 Mon Sep 17 00:00:00 2001
From: Timo Sirainen <[email protected]>
Date: Sat, 6 Jan 2018 21:22:11 +0200
Subject: [PATCH] ostream-zlib: Ignore missing finish if parent stream is
 ignoring errors

This fixes panic with imap_zlib plugin when client enables the IMAP COMPRESS
extension and disconnects:

Panic: file ostream-zlib.c: line 36 (o_stream_zlib_close): assertion failed: 
(zstream->ostream.finished || zstream->ostream.ostream.stream_errno != 0)
---
 src/lib-compression/ostream-zlib.c | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/src/lib-compression/ostream-zlib.c 
b/src/lib-compression/ostream-zlib.c
index 848ecb7b89..e0b9a91416 100644
--- a/src/lib-compression/ostream-zlib.c
+++ b/src/lib-compression/ostream-zlib.c
@@ -33,7 +33,8 @@ static void o_stream_zlib_close(struct iostream_private 
*stream,
        struct zlib_ostream *zstream = (struct zlib_ostream *)stream;
 
        i_assert(zstream->ostream.finished ||
-                zstream->ostream.ostream.stream_errno != 0);
+                zstream->ostream.ostream.stream_errno != 0 ||
+                zstream->ostream.error_handling_disabled);
        (void)deflateEnd(&zstream->zs);
        if (close_parent)
                o_stream_close(zstream->ostream.parent);

Reply via email to