Commit Graph

357 Commits

Author SHA1 Message Date
Daniel Golle 8cc66d20fe exim: update to version 4.96.2
Fixes vulnerabilities:
 - Improper Neutralization of Special Elements (CVE-2023-42117)
 - dnsdb Out-Of-Bounds Read (CVE-2023-42119)

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 86ec7b19bc)
2023-10-31 11:10:24 +01:00
Daniel Golle 79804fa23c exim: update to version 4.96.1
This is a security release.

JH/01 Bug 2999: Fix a possible OOB write in the external authenticator, which
      could be triggered by externally-supplied input.  Found by Trend Micro.
      CVE-2023-42115

JH/02 Bug 3000: Fix a possible OOB write in the SPA authenticator, which could
      be triggered by externally-controlled input.  Found by Trend Micro.
      CVE-2023-42116

JH/03 Bug 3001: Fix a possible OOB read in the SPA authenticator, which could
      be triggered by externally-controlled input.  Found by Trend Micro.
      CVE-2023-42114

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 7c8f4a2a1c)
2023-10-08 08:32:02 +02:00
Daniel Golle d6152cc032 exim: apply hotfix for some ZDI reported vulnerabilities
Apply preliminary hotfix for some (three?) of the 0-day
vulnerabilities reported by ZDI.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit db85d9ead6)
2023-10-04 12:10:24 +02:00
Josef Schlehofer 1b0392321d msmtp: update to version 1.8.24
Release notes:
ef62463e4dX

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 29a9a6a4a7)
2023-09-22 00:30:15 +02:00
Daniel Golle 5b1511daf1
exim: update to version 4.96
Exim version 4.96
-----------------

JH/01 Move the wait-for-next-tick (needed for unique message IDs) from
      after reception to before a subsequent reception.  This should
      mean slightly faster delivery, and also confirmation of reception
      to senders.

JH/02 Move from using the pcre library to pcre2.  The former is no longer
      being developed or supported (by the original developer).

JH/03 Constification work in the filters module required a major version
      bump for the local-scan API.  Specifically, the "headers_charset"
      global which is visible via the API is now const and may therefore
      not be modified by local-scan code.

JH/04 Fix ClamAV TCP use under FreeBSD. Previously the OS-specific shim for
      sendfile() didi not account for the way the ClamAV driver code called it.

JH/05 Bug 2819: speed up command-line messages being read in.  Previously a
      time check was being done for every character; replace that with one
      per buffer.

JH/06 Bug 2815: Fix ALPN sent by server under OpenSSL.  Previously the string
      sent was prefixed with a length byte.

JH/07 Change the SMTP feature name for pipelining connect to be compliant with
      RFC 5321.  Previously Dovecot (at least) would log errors during
      submission.

JH/08 Remove stripping of the binaries from the FreeBSD build.  This was added
      in 4.61 without a reason logged. Binaries will be bigger, which might
      matter on diskspace-constrained systems, but debug is easier.

JH/09 Fix macro-definition during "-be" expansion testing.  The move to
      write-protected store for macros had not accounted for these runtime
      additions; fix by removing this protection for "-be" mode.

JH/10 Convert all uses of select() to poll().  FreeBSD 12.2 was found to be
      handing out large-numbered file descriptors, violating the usual Unix
      assumption (and required by Posix) that the lowest possible number will be
      allocated by the kernel when a new one is needed.  In the daemon, and any
      child procesees, values higher than 1024 (being bigger than FD_SETSIZE)
      are not useable for FD_SET() [and hence select()] and overwrite the stack.
      Assorted crashes happen.

JH/11 Fix use of $sender_host_name in daemon process.  When used in certain
      main-section options or in a connect ACL, the value from the first ever
      connection was never replaced for subsequent connections.  Found by
      Wakko Warner.

JH/12 Bug 2838: Fix for i32lp64 hard-align platforms. Found for SPARC Linux,
      though only once PCRE2 was introduced: the memory accounting used under
      debug offset allocations by an int, giving a hard trap in early startup.
      Change to using a size_t.  Debug and fix by John Paul Adrian Glaubitz.

JH/13 Bug 2845: Fix handling of tls_require_ciphers for OpenSSL when a value
      with underbars is given.  The write-protection of configuration introduced
      in 4.95 trapped when normalisation was applied to an option not needing
      expansion action.

JH/14 Bug 1895: TLS: Deprecate RFC 5114 Diffie-Hellman parameters.

JH/15 Fix a resource leak in *BSD.  An off-by-one error resulted in the daemon
      failing to close the certificates directory, every hour or any time it
      was touched.

JH/16 Debugging initiated by an ACL control now continues through into routing
      and transport processes.  Previously debugging stopped any time Exim
      re-execs, or for processing a queued message.

JH/17 The "expand" debug selector now gives more detail, specifically on the
      result of expansion operators and items.

JH/18 Bug 2751: Fix include_directory in redirect routers.  Previously a
      bad comparison between the option value and the name of the file to
      be included was done, and a mismatch was wrongly identified.
      4.88 to 4.95 are affected.

JH/19 Support for Berkeley DB versions 1 and 2 is withdrawn.

JH/20 When built with NDBM for hints DB's check for nonexistence of a name
      supplied as the db file-pair basename.  Previously, if a directory
      path was given, for example via the autoreply "once" option, the DB
      file.pag and file.dir files would be created in that directory's
      parent.

JH/21 Remove the "allow_insecure_tainted_data" main config option and the
      "taint" log_selector.  These were previously deprecated.

JH/22 Fix static address-list lookups to properly return the matched item.
      Previously only the domain part was returned.

JH/23 Bug 2864: FreeBSD: fix transport hang after 4xx/5xx response. Previously
      the call into OpenSSL to send a TLS Close was being repeated; this
      resulted in the library waiting for the peer's Close.  If that was never
      sent we waited forever.  Fix by tracking send calls.

JH/24 The ${run} expansion item now expands its command string elements after
      splitting.  Previously it was before; the new ordering makes handling
      zero-length arguments simpler.  The old ordering can be obtained by
      appending a new option "preexpand", after a comma, to the "run".

JH/25 Taint-check exec arguments for transport-initiated external processes.
      Previously, tainted values could be used.  This affects "pipe", "lmtp" and
      "queryprogram" transport, transport-filter, and ETRN commands.
      The ${run} expansion is also affected: in "preexpand" mode no part of
      the command line may be tainted, in default mode the executable name
      may not be tainted.

JH/26 Fix CHUNKING on a continued-transport.  Previously the usabliility of
      the the facility was not passed across execs, and only the first message
      passed over a connection could use BDAT; any further ones using DATA.

JH/27 Support the PIPECONNECT facility in the smtp transport when the helo_data
      uses $sending_ip_address and an interface is specified.
      Previously any use of the local address in the EHLO name disabled
      PIPECONNECT, the common case being to use the rDNS of it.

JH/28 OpenSSL: fix transport-required OCSP stapling verification under session
      resumption. Previously verify failed because no certificate status is
      passed on the wire for the restarted session. Fix by using the recorded
      ocsp status of the stored session for the new connection.

JH/29 TLS resumption: the key for session lookup in the client now includes
      more info that a server could potentially use in configuring a TLS
      session, avoiding oferring mismatching sessions to such a server.
      Previously only the server IP was used.

JH/30 Fix string_copyn() for limit greater than actual string length.
      Previously the copied amount was the limit, which could result in a
      overlapping memcpy for newly allocated destination soon after a
      source string shorter than the limit.  Found/investigated  by KM.

JH/31 Bug 2886: GnuTLS: Do not free the cached creds on transport connection
      close; it may be needed for a subsequent connection.  This caused a
      SEGV on primary-MX defer.  Found/investigated by Gedalya & Andreas.

JH/32 Fix CHUNKING for a second message on a connection when the first was
      rejected.  Previously we did not reset the chunking-offered state, and
      erroneously rejected the BDAT command.  Investigation help from
      Jesse Hathaway.

JH/33 Fis ${srs_encode ...} to handle an empty sender address, now returning
      an empty address.  Previously the expansion returned an error.

HS/01 Bug 2855: Handle a v4mapped sender address given us by a frontending
      proxy.  Previously these were misparsed, leading to paniclog entries.

Also contains commit 51be321b27 "Fix PAM auth. Bug 2813" addressing
CVE-2022-37451.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit f2763b95af)
2022-10-13 20:26:18 +01:00
Michal Vasilek 57d7325a88
postfix: fix download failure
cdn.postfix.johnriley.me serves a certificate for a different domain
name.

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit d4feef97e6)
2022-07-17 15:03:54 +02:00
Josef Schlehofer 5ebaa73d5e
msmtp: update to version 1.8.1.9
Changelog:
https://marlam.de/msmtp/news/msmtp-1-8-19/

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 173faad334)
2021-12-04 09:24:29 +01:00
Daniel Golle 2c6faddd3b
exim: update to version 4.95
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 40c71110f0)
2021-11-15 20:05:40 +00:00
Daniel Golle 4f84a86318
exim: some clean ups
* use username/group 'exim' instead of mail
 * register configuration file
 * make sure /usr/lib/exim/lookups exists

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 66a62e2fcf)
2021-11-15 20:05:35 +00:00
Daniel Golle 72288cc396
exim: add default config and init script, enable lmtp
Ship default configuration /etc/exim/exim.conf as well as
a simple procd init script. Enable building with LMTP for better
integration with dovecot.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 31d12ead78)
2021-11-15 20:05:31 +00:00
Daniel Golle 783ee334f0
exim: update to version 4.94.2
Several exploitable vulnerabilities in Exim were reported to us and are
fixed.
Local vulnerabilities
- CVE-2020-28007: Link attack in Exim's log directory
- CVE-2020-28008: Assorted attacks in Exim's spool directory
- CVE-2020-28014: Arbitrary PID file creation
- CVE-2020-28011: Heap buffer overflow in queue_run()
- CVE-2020-28010: Heap out-of-bounds write in main()
- CVE-2020-28013: Heap buffer overflow in parse_fix_phrase()
- CVE-2020-28016: Heap out-of-bounds write in parse_fix_phrase()
- CVE-2020-28015: New-line injection into spool header file (local)
- CVE-2020-28012: Missing close-on-exec flag for privileged pipe
- CVE-2020-28009: Integer overflow in get_stdinput()
Remote vulnerabilities
- CVE-2020-28017: Integer overflow in receive_add_recipient()
- CVE-2020-28020: Integer overflow in receive_msg()
- CVE-2020-28023: Out-of-bounds read in smtp_setup_msg()
- CVE-2020-28021: New-line injection into spool header file (remote)
- CVE-2020-28022: Heap out-of-bounds read and write in extract_option()
- CVE-2020-28026: Line truncation and injection in spool_read_header()
- CVE-2020-28019: Failure to reset function pointer after BDAT error
- CVE-2020-28024: Heap buffer underflow in smtp_ungetc()
- CVE-2020-28018: Use-after-free in tls-openssl.c
- CVE-2020-28025: Heap out-of-bounds read in pdkim_finish_bodyhash()

The update to 4.94.2 also integrates a fix for a printf format issue
previously addressed by a local patch which is removed.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit c241cb12bb)
2021-11-15 20:05:26 +00:00
Rosen Penev cead8569ef
exim: fix compilation without deprecated OpenSSL APIs
Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit de9c527e9a)
2021-11-15 20:05:22 +00:00
Josef Schlehofer 5a96548c25
msmtp: update to version 1.8.17
- Use AUTORELEASE fce
It helps when someone forgets to bump PKG_RELEASE

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 18261fcd31)
2021-10-26 11:07:34 +02:00
Michal Vasilek f5669e3a68
mblaze: new package
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit 80f7a8ec8b)
2021-08-19 21:26:23 +02:00
Josef Schlehofer c7a50e06b3
msmtp: update to version 1.8.15
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 110abfb9f6)
2021-06-01 12:16:53 +02:00
Eneas U de Queiroz cbd5c9cb92
pigeonhole: bump to 0.5.14
ChangeLog:
 - IMAP FILTER command: cmd-filter-sieve - Do not allow NIL as script
   name argument.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit e40776d264)
2021-03-10 21:21:29 -03:00
Rosen Penev 6d18aa43d0
pigeonhole: update to 0.5.13
Switch to AUTORELEASE for simplicity.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 3eb83963cf)
2021-03-10 21:21:29 -03:00
Rosen Penev 50512fccd1
dovecot: update to 2.3.13
Fixed and refreshed patches.

Switched to AUTORELEASE for simplicity.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 6baf7dd125)
2021-02-26 13:03:27 +01:00
Ilya Lipnitskiy b1cbd93bcd
treewide: Run refresh on all packages
The crude loop I wrote to come up with this changeset:

  find -L package/feeds/packages/ -name patches | \
  sed 's/patches$/refresh/' | sort | xargs make

Signed-off-by: Ilya Lipnitskiy <ilya.lipnitskiy@gmail.com>
(cherry picked from commit 5d8d4fbbcb)
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2021-02-25 01:26:05 +08:00
Rosen Penev 1d04c219db alpine: try to make reproducible
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-02-02 22:38:12 -08:00
Josef Schlehofer ff76e24e5a
msmtp: update to version 1.8.14
Release notes for 1.8.1.3:
https://marlam.de/msmtp/news/msmtp-1-8-13/

Release notes for 1.8.1.4:
https://marlam.de/msmtp/news/msmtp-1-8-13/

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-01-18 23:49:55 +01:00
Rosen Penev 89b6174691
exim: fix compilation with CentOS 7
CentOS 7 has an old GCC that does not default to c11.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-01-11 14:04:31 -08:00
Daniel Golle cd587f3767 exim: add package
Add Exim MTA variants:
 * exim
   plain variant without any TLS library which hence comes
   without TLS, DANE and DKIM.
 * exim-openssl
   linked against libopenssl
 * exim-gnutls
   linked against libgnutls
 * exim-ldap
   linked against libopenssl, libopenldap and libsasl2

Provide packages for lookup modules
 * cdb
 * dbmdb
 * dnsdb
 * json (depends on jansson)
 * mysql (depends on libmariadb)
 * passwd
 * pgsql (depends on libpq)
 * redis (depends on libhiredis)
 * sqlite (depends on libsqlite3)

Note:
As gnutls requires libunbound which depends on libopenssl to provide
libgnutls-dane, disable DANE by default when building with gnutls.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-01-03 00:18:29 +00:00
Rosen Penev 7ce3b159e3
Merge pull request #14384 from neheb/posf
postfix: update to 3.5.8
2021-01-01 12:48:28 -08:00
Rosen Penev ee7cc66aea
opendkim: fix compilation with glibc
Add libbsd dependency.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-31 02:40:32 -08:00
Rosen Penev 788afe757d
postfix: update to 3.5.8
Pass TARGET_[C/LD]FLAGS to reduce filesize.

Fix glibc compilation by adding lresolv.

Remove uClibc-ng patch as that's now gone.

Refreshed other patches.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-31 02:29:46 -08:00
Rosen Penev 29b91b0141
alpine: update to 2.24
Add BROKEN to nossl. Upstream broke it by requiring OpenSSL.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-13 16:15:30 -08:00
Florian Eckert fef5dda5f6 postfix: use new extra_command function definition
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-11-04 08:50:34 +01:00
Rosen Penev c9ad71dbfd
postfix: update to 3.5.7
Fix compilation with GCC10.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-10-11 19:11:53 -07:00
Phil Eichinger 9626329dc4 mutt: bump to 1.14.7
Signed-off-by: Phil Eichinger <phil@zankapfel.net>
2020-10-08 12:58:11 +02:00
Rosen Penev aea5236367
sendmail: update to 8.16.1
Refreshed patches and removed upstreamed ones.

Switched main URL and removed others. None of them have the proper
file. The first actually has a bad one. The changed URL is from the
official website.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-09-22 18:35:45 -07:00
W. Michael Petullo c502f261d3 pigeonhole: update to 0.5.11
This fixes an error in the previous package when building against recent
OpenWrt releases:

In file included from /builder/shared-workdir/build/sdk/staging_dir/target-x86_64_musl/usr/include/dovecot/lib.h:50,
                 from ext-variables-common.c:4:
ext-variables-common.c: In function 'ext_variables_load':
ext-variables-common.c:91:14: error: expected ')' before 'PRIuSIZE_T'
       "(>= %"PRIuSIZE_T" bytes)",

Signed-off-by: W. Michael Petullo <mike@flyn.org>
2020-09-12 19:10:22 -05:00
Josef Schlehofer dd0ba4a55b
msmtp: update to version 1.8.12
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2020-09-12 15:33:02 +02:00
Jan Pavlinec a5c9ef50dc
dovecot: disable zstd
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-09-10 12:38:01 +02:00
Jan Pavlinec 8ae394430a
dovecot: update to version 2.3.11.3 (security fix)
Fixes:
CVE-2020-12100
CVE-2020-12673
CVE-2020-12674

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-09-08 12:57:01 +02:00
Rosen Penev fbce6dd303
clamsmtp: remove
Judging from https://salsa.debian.org/clamav-team/clamsmtp/-/tags ,
it seems that this was last updated 11 years ago. The domain is also
gone.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-08-12 18:10:37 -07:00
Rosen Penev 2d8ef5defe
Merge pull request #13063 from neheb/sendm
sendmail: fix compilation without sys/cdefs
2020-08-12 13:10:19 -07:00
Rosen Penev dfd0ca4295
Merge pull request #13072 from neheb/alpi
alpine: fix compilation without sys/cdefs
2020-08-11 11:41:25 -07:00
Rosen Penev 06bedef3d5
fdm: fix compilation without sys/cdefs
It seems this is completely unused.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-08-11 11:32:39 -07:00
Rosen Penev 2d155c82ff
alpine: fix compilation without sys/cdefs
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-08-10 16:53:15 -07:00
Rosen Penev f10ec9241e
sendmail: fix compilation without sys/cdefs
sys/cdefs is deprecated. It's also not included with musl.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-08-10 15:22:32 -07:00
Rosen Penev c8cee2bbee
mutt: update to 1.14.6
Fixes CVE-2020-14154

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-07-23 13:37:00 -07:00
Josef Schlehofer dd44bf2e7a
msmtp: update to version 1.8.11
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2020-07-17 17:37:28 +02:00
Dirk Brenken 104936a2f7
ssmtp: package removal
* remove orphaned ssmtp package

Signed-off-by: Dirk Brenken <dev@brenken.org>
2020-07-08 09:53:37 +02:00
Rosen Penev 6af49f7579
alpine: update to 2.23
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-06-22 14:44:14 -07:00
Jan Pavlinec d863e26817
dovecot: update to version 2.3.10.1 (security fix)
Fixes:
CVE-2020-10957
CVE-2020-10958
CVE-2020-10967

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-05-29 15:11:50 +02:00
Josef Schlehofer e193db6b69
msmtp: update to version 1.8.10
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2020-05-24 22:10:48 +02:00
Ian Cooper 645bea6d88 dovecot: remove incorrect PKG_BUILD_DEPENDS
The package Makefile contains a PKG_BUILD_DEPENDS=libiconv
line, which apart from being incorrect if libiconv-full is
specified in the build configuration, is also unnecessary,
since the package Makefile already includes nls.mk which
sets PKG_BUILD_DEPENDS appropriately.

Signed-off-by: Ian Cooper <iancooper@hotmail.com>
2020-04-30 00:52:12 +01:00
Lucian Cristian 4cde1f8f8b postfix: update to 3.5.0
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2020-04-10 02:45:00 +03:00
Jeffery To cec41bccaf mailman: Remove package
This version of mailman will cease to function once Python 2 is removed
from the feed. There does not appear to be any interest in updating this
package to a current version that uses Python 3.

This package will be added to the abandoned packages feed.

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2020-03-31 14:54:23 +08:00