SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for dovecot23-fts-solr-2.3.4.1-51.2.x86_64.rpm :
Tue Feb 5 13:00:00 2019 Marcus Rueckert
- update to 2.3.4.1 (boo#1123022)

* CVE-2019-3814: If imap/pop3/managesieve/submission client has
trusted certificate with missing username field
(ssl_cert_username_field), under some configurations Dovecot
mistakenly trusts the username provided via authentication
instead of failing.

* ssl_cert_username_field setting was ignored with external
SMTP AUTH, because none of the MTAs (Postfix, Exim) currently
send the cert_username field. This may have allowed users with
trusted certificate to specify any username in the
authentication. This bug didn\'t affect Dovecot\'s Submission
service.

Thu Jan 17 13:00:00 2019 Arjen de Korte
- add buildrequires zlib-devel which used to be pulled in by other
buildrequires, but no longer is

Thu Dec 6 13:00:00 2018 Marcus Rueckert
- added 3c5101ffdd2a8115e03ed7180d53578765dea4c9.patch:
fix crash with mysql/mariadb

Sun Nov 25 13:00:00 2018 Marcus Rueckert
- added 10048229...de42b54a.patch:
Fix build failures on TW i586

Sat Nov 24 13:00:00 2018 Marcus Rueckert
- update to 2.3.4

* The default postmaster_address is now \"postmasterAATT or server hostname>\". If username contains the AATTdomain part,
that\'s used. If not, then the server\'s hostname is used.

* \"doveadm stats dump\" now returns two decimals for the \"avg\"
field.
+ Added push notification driver that uses a Lua script
+ Added new SQL, DNS and connection events.
See https://wiki2.dovecot.org/Events
+ Added \"doveadm mailbox cache purge\" command.
+ Added events API support for Lua scripts
+ doveadm force-resync -f parameter performs \"index fsck\" while
opening the index. This may be useful to fix some types of
broken index files. This may become the default behavior in a
later version.
- director: Kicking a user crashes if login process is very slow
- pop3_no_flag_updates=no: Don\'t expunge DELEted and RETRed
messages unless QUIT is sent.
- auth: Fix crypt() segfault with glibc-2.28+
- imap: Running UID FILTER script with errors assert-crashes
- dsync, pop3-migration: POP3 UIDLs weren\'t added to
dovecot.index.cache while mails were saved.
- dict clients may have been using 100% CPU while waiting for
dict server to finish commands.
- doveadm user: Fixed user listing via HTTP API
- All levels of Cassandra log messages were logged as Dovecot
errors.
- http/smtp client may have crashed after SSL handshake
- Lua auth converted strings that looked like numbers into
numbers.
- update pigeonhole to 0.5.4

* Adjustments to several changes in Dovecot v2.3.4 make this
Pigeonhole release dependent on that Dovecot release; it will
not compile against older Dovecot versions. And, conversely,
you need to upgrade Pigeonhole when upgrading Dovecot to
v2.3.4.

* The changes regarding the default postmaster_address in Dovecot
v2.3.4 mainly apply to Pigeonhole. The new default should work
for all existing installations, thereby fixing several reported
v2.3/v0.5 migration problems.
- IMAP FILTER=SIEVE capability: Fix assert crash occurring when running
UID FILTER on a Sieve script with errors.

Mon Oct 1 14:00:00 2018 Marcus Rueckert
- update pigeonhole to 0.5.3
- Fix assertion panic occurring when managesieve service fails to
open INBOX while saving a Sieve script. This was caused by a
lack of cleanup after failure.
- Fix specific messages causing an assert panic with actions that
compose a reply (e.g. vacation). With some rather weird input
from the original message, the header folding algorithm (as
used for composing the References header for the reply) got
confused, causing the panic.
- IMAP FILTER=SIEVE capability: Fix FILTER SIEVE SCRIPT command
parsing. After finishing reading the Sieve script, the command
parsing sometimes didn\'t continue with the search arguments.
This is a time- critical bug that likely only occurs when the
Sieve script is sent in the next TCP frame.

Mon Oct 1 14:00:00 2018 Marcus Rueckert
- update to 2.3.3

* doveconf hides more secrets now in the default output.

* ssl_dh setting is no longer enforced at startup. If it\'s not
set and non-ECC DH key exchange happens, error is logged and
client is disconnected.
+ Added log_debug= setting.
+ Added log_core_filter= setting.
+ quota-clone: Write to dict asynchronously
+ --enable-hardening attempts to use retpoline Spectre 2
mitigations
+ lmtp proxy: Support source_ip passdb extra field.
+ doveadm stats dump: Support more fields and output stddev
by default.
+ push-notification: Add SSL support for OX backend.
- NUL bytes in mail headers can cause truncated replies when
fetched.
- director: Conflicting host up/down state changes may in some
rare situations ended up in a loop of two directors constantly
overwriting each others\' changes.
- director: Fix hang/crash when multiple doveadm commands are
being handled concurrently.
- director: Fix assert-crash if doveadm disconnects too early
- virtual plugin: Some searches used 100% CPU for many seconds
- dsync assert-crashed with acl plugin in some situations.
- mail_attachment_detection_options=add-flags-on-save
assert-crashed with some specific Sieve scripts.
- Mail snippet generation crashed with mails containing invalid
Content-Type:multipart header.
- Log prefix ordering was different for some log lines.
- quota: With noenforcing option current quota usage wasn\'t
updated.
- auth: Kerberos authentication against Samba assert-crashed.
- stats clients were unnecessarily chatty with the stats server.
- imapc: Fixed various assert-crashes when reconnecting to
server.
- lmtp, submission: Fix potential crash if client disconnects
while handling a command.
- quota: Fixed compiling with glibc-2.26 / support libtirpc.
- fts-solr: Empty search values resulted in 400 Bad Request
errors
- fts-solr: default_ns parameter couldn\'t be used
- submission server crashed if relay server returned over 7 lines
in a reply (e.g. to EHLO)
- dropped 4ff4bd024a9b6e7973b76b186ce085c2ca669d3e.patch:
included in update

Fri Jul 13 14:00:00 2018 mrueckertAATTsuse.de
- added
https://github.com/dovecot/core/commit/4ff4bd024a9b6e7973b76b186ce085c2ca669d3e.patch

Wed Jul 11 14:00:00 2018 mrueckertAATTsuse.de
- update to 2.3.2.1
- SSL/TLS servers may have crashed during client disconnection
- lmtp: With lmtp_rcpt_check_quota=yes mail deliveries may have
sometimes assert-crashed.
- v2.3.2: \"make check\" may have crashed with 32bit systems

Sat Jun 30 14:00:00 2018 mrueckertAATTsuse.de
- update to 2.3.2

* old-stats plugin: Don\'t temporarily enable PR_SET_DUMPABLE
while opening /proc/self/io. This may still cause security
problems if the process is ptrace()d at the same time.
Instead, open it while still running as root.
+ doveadm: Added mailbox cache decision&remove commands. See
doveadm-mailbox(1) man page for details.
+ doveadm: Added rebuild attachments command for rebuilding
$HasAttachment or $HasNoAttachment flags for matching mails.
See doveadm-rebuild(1) man page for details.
+ cassandra: Use fallback_consistency on more types of errors
+ lmtp proxy: Support outgoing SSL/TLS connections
+ lmtp: Add lmtp_rawlog_dir and lmtp_proxy_rawlog_dir settings.
+ submission: Add support for rawlog_dir
+ submission: Add submission_client_workarounds setting.
+ lua auth: Add password_verify() function and additional fields
in auth request.
- doveadm-server: TCP connections are hanging when there is a lot
of network output. This especially caused hangs in
dsync-replication.
- Using multiple type=shared mdbox namespaces crashed
- mail_fsync setting was ignored. It was always set to
\"optimized\".
- lua auth: Fix potential crash at deinit
- SSL/TLS servers may have crashed if client disconnected during
handshake.
- SSL/TLS servers: Don\'t send extraneous certificates to client
when alt certs are used.
- lda, lmtp: Return-Path header without \'<\' may have
assert-crashed.
- lda, lmtp: Unencoded UTF-8 in email address headers may
assert-crash
- lda: -f parameter didn\'t allow empty/null/domainless address
- lmtp, submission: Message size limit was hardcoded to 40 MB.
Exceeding it caused the connection to get dropped during
transfer.
- lmtp: Fix potential crash when delivery fails at DATA stage
- lmtp: login_greeting setting was ignored
- Fix to work with OpenSSL v1.0.2f
- systemd unit restrictions were too strict by default
- Fix potential crashes when a lot of log output was produced
- SMTP client may have assert-crashed when sending mail
- IMAP COMPRESS: Send \"end of compression\" marker when
disconnecting.
- cassandra: Fix consistency=quorum to work
- dsync: Lock file generation failed if home directory didn\'t
exist
- Snippet generation for HTML mails didn\'t ignore &entities
inside blockquotes, producing strange looking snippets.
- imapc: Fix assert-crash if getting disconnected and after
reconnection all mails in the selected mailbox are gone.
- pop3c: Handle unexpected server disconnections without
assert-crash
- fts: Fixes to indexing mails via virtual mailboxes.
- fts: If mails contained NUL characters, the text around it
wasn\'t indexed.
- Obsolete dovecot.index.cache offsets were sometimes used.
Trying to fetch a field that was just added to cache file may
not have always found it.
- update pigeonhole to 0.5.2
+ Implement plugin for the a vendor-defined IMAP capability
called \"FILTER=SIEVE\". It adds the ability to manually invoke
Sieve filtering in IMAP. More information can be found in
doc/plugins/imap_filter_sieve.txt.
- The Sieve addess test caused an assertion panic for invalid
addresses with UTF-8 codepoints in the localpart. Fixed by
properly detecting invalid addresses with UTF-8 codepoints in
the localpart and skipping these like other invalid addresses
while iterating addresses for the address test.
- Make the length of the subject header for the vacation response
configurable and enforce the limit in UTF-8 codepoints rather
than bytes. The subject header for a vacation response was
statically truncated to 256 bytes, which is too limited for
multi-byte UTF-8 characters.
- Sieve editheader extension: Fix assertion panic occurring when
it is used to manipulate a message header with a very large
header field.
- Properly abort execution of the sieve_discard script upon
error. Before, the LDA Sieve plugin attempted to execute the
sieve_discard script when an error occurs. This can lead to the
message being lost.
- Fix the interaction between quota and the sieve_discard script.
When quota was used together with a sieve_discard script, the
message delivery did not bounce when the quota was exceeded.
- refreshed to apply cleanly again dovecot-2.3.0-better_ssl_defaults.patch
- dropped patches:
- 35497604d80090a02619024aeec069b32568e4b4.diff
- 5522b8b3d3ed1a99c3b63bb120216af0bd427403.diff
- 847790d5aab84df38256a6f9b4849af0eb408419.patch

Sun May 27 14:00:00 2018 mrueckertAATTsuse.de
- added 847790d5aab84df38256a6f9b4849af0eb408419.patch:
Fix crash for over quota users

Thu May 24 14:00:00 2018 kbabiochAATTsuse.com
- Use OpenPGP signatures provided upstream
- Added dovecot23.keyring, which contains the keys from the upstream projects

Tue Apr 10 14:00:00 2018 varkolyAATTsuse.com
- bnc#1088911 - dovecot23 can not build ond s390
add: 35497604d80090a02619024aeec069b32568e4b4.diff
add: 5522b8b3d3ed1a99c3b63bb120216af0bd427403.diff

Wed Mar 28 14:00:00 2018 mrueckertAATTsuse.de
- update pigeonhole to 0.5.1
- Explicitly disallow UTF-8 in localpart in addresses parsed from
Sieve script.
- editheader extension: Corrected the stream position
calculations performed while making the modified message
available as a stream. Pigeonhole Sieve crashed in LMTP with
an assertion panic when the Sieve editheader extension was used
before the message was redirected. Experiments indicate that
the problem occurred only with LMTP and that LDA is not
affected.
- fileinto extension: Fix assert panic occurring when fileinto is
used without being listed in the require line, while the copy
extension is listed there. This is a very old bug.
- imapsieve plugin: Do not assert crash or log an error for
messages that disappear concurrently while applying Sieve
scripts. This event is now logged as a debug message.
- Sieve extprograms plugin: Large output from \"execute\" command
crashed delivery. Fixed buffering issue in code that handles
output from the external program.

Tue Mar 27 14:00:00 2018 mrueckertAATTsuse.de
- update to 2.3.1

* Submission server support improvements and bug fixes
- Lots of bug fixes to submission server

* API CHANGE: array_idx_modifiable will no longer allocate space
- Particularly affects how you should check MODULE_CONTEXT
result, or use REQUIRE_MODULE_CONTEXT.
+ mail_attachment_detection_options setting controls when
$HasAttachment and $HasNoAttachment keywords are set for mails.
+ imap: Support fetching body snippets using FETCH (SNIPPET) or
(SNIPPET (LAZY=FUZZY))
+ fs-compress: Automatically detect whether input is compressed
or not. Prefix the compression algorithm with \"maybe-\" to
enable the detection, for example: \"compress:maybe-gz:6:...\"
+ Added settings to change dovecot.index
* files\' optimization
behavior. See https://wiki2.dovecot.org/IndexFiles#Settings
+ Auth cache can now utilize auth workers to do password hash
verification by setting
auth_cache_verify_password_with_worker=yes.
+ Added charset_alias plugin. See
https://wiki2.dovecot.org/Plugins/CharsetAlias
+ imap_logout_format and pop3_logout_format settings now support
all of the generic variables (e.g. %{rip}, %{session}, etc.)
+ Added auth_policy_check_before_auth,
auth_policy_check_after_auth and auth_policy_report_after_auth
settings.
+ master: Support HAProxy PP2_TYPE_SSL command and set \"secured\"
variable appropriately
- Invalid UCS4 escape in HTML can cause crashes
- imap: IMAP COMPRESS -enabled client crashes on disconnect
- lmtp: Fix crash when user is over quota
- lib-lda: Parsing Return-Path header address fails when it
contains CFWS
- auth: SASL with Exim fails for AUTH commands without an initial
response
- imap: SPECIAL-USE capability isn\'t automatically added
- auth: LDAP subqueries do not support standard auth variables in
var-expand
- auth: SHA256-CRYPT and SHA512-CRYPT schemes do not work
- lib-index: mail_always/never_cache_fields are not used for
existing cache files
- imap: Fetching headers leaks memory if search doesn\'t find any
mails
- lmtp: ORCPT support in RCPT TO
- imap-login: Process sometimes ends up in infinite loop
- sdbox: Rolled back save/copy transaction doesn\'t delete temp
files
- mail: lock_method=dotlock causes crashes
- drop patches which are included in the update
23da0fa1b30cc11bcc1d467674a0950c527e9ff1.patch
dovecot-2.3.0.1-over-quota-lmtp-crash.patch

Tue Mar 13 13:00:00 2018 dimstarAATTopensuse.org
- Fix License tag.

Wed Mar 7 13:00:00 2018 mrueckertAATTsuse.de
- added 23da0fa1b30cc11bcc1d467674a0950c527e9ff1.patch

Wed Mar 7 13:00:00 2018 mrueckertAATTsuse.de
- update license to SPDX-3

Tue Mar 6 13:00:00 2018 mrueckertAATTsuse.de
- update pigeonhole to 0.5.0.1
- imap4flags extension: Fix binary corruption occurring when
setflag/addflag/removeflag flag-list is a variable.
- sieve-extprograms plugin: Fix segfault occurring when used in
IMAPSieve context.
- drop 321a39be974deb2e7eff7b2a509a3ee6ff2e5ae1.patch

Tue Mar 6 13:00:00 2018 mrueckertAATTsuse.de
- pull backport patch dovecot-2.3.0.1-over-quota-lmtp-crash.patch

Tue Mar 6 13:00:00 2018 mrueckertAATTsuse.de
- update to 2.3.0.1

* CVE-2017-15130: TLS SNI config lookups may lead to excessive
memory usage, causing imap-login/pop3-login VSZ limit to be
reached and the process restarted. This happens only if Dovecot
config has local_name { } or local { } configuration blocks and
attacker uses randomly generated SNI servernames. (boo#1082828)

* CVE-2017-14461: Parsing invalid email addresses may cause a
crash or leak memory contents to attacker. For example, these
memory contents might contain parts of an email from another
user if the same imap process is reused for multiple users.
First discovered by Aleksandar Nikolic of Cisco Talos.
Independently also discovered by \"flxflndy\" via HackerOne.
(boo#1082826)

* CVE-2017-15132: Aborted SASL authentication leaks memory in
login process. (boo#1075608)

* Linux: Core dumping is no longer enabled by default via
PR_SET_DUMPABLE, because this may allow attackers to bypass
chroot/group restrictions. Found by cPanel Security Team.
Nowadays core dumps can be safely enabled by using \"sysctl -w
fs.suid_dumpable=2\". If the old behaviour is wanted, it can
still be enabled by setting:
import_environment=$import_environment PR_SET_DUMPABLE=1
- imap-login with SSL/TLS connections may end up in infinite loop

Mon Dec 25 13:00:00 2017 jengelhAATTinai.de
- Replace %__-type macro indirections.
Replace xargs rm by built in -delete of find(1).
- Run ldconfig directly via %post -p.
- Check for users in %pre before creating them, and do not suppress
errors about it.

Mon Dec 25 13:00:00 2017 mrueckertAATTsuse.de
- backport 321a39be974deb2e7eff7b2a509a3ee6ff2e5ae1.patch
fixes crash with imap sieve

Sun Dec 24 13:00:00 2017 mrueckertAATTsuse.de
- Move the example-config + mkcert.sh to /usr/share/dovecot
This makes the files no longer documentation and they actually
exist on e.g. our docker image, where rpms are installed without
documentation. (boo#1070871)

Wed Dec 20 13:00:00 2017 mrueckertAATTsuse.de
- starting 2.3 package based on the latest 2.2 branch
There are several new and exciting features in v2.3.0. I\'m
especially happy about the new logging and statistics code, which
will allow us to generate statistics for just about everything.
We didn\'t have time to implement everything we wanted for them
yet, and there especially aren\'t all that many logging events yet
that can be used for statistics. We\'ll implement those to v2.3.1,
which might also mean that some of the APIs might still change in
v2.3.1 if that\'s required.
We also have new lib-smtp server code, which was used to
implement SMTP submission server and do a partial rewrite for
LMTP server.
Some of the larger changes:

* Various setting changes, see
https://wiki2.dovecot.org/Upgrading/2.3
If you upgrade from 2.2: Config file changes:
- Removed:
/etc/dovecot/conf.d/11-object-storage.conf
- Added:
/etc/dovecot/conf.d/20-submission.conf

* Logging rewrite started: Logging is now based on hierarchical
events. This makes it possible to do various things, like: 1)
giving consistent log prefixes, 2) enabling debug logging with
finer granularity, 3) provide logs in more machine readable
formats (e.g. json). Everything isn\'t finished yet, especially
a lot of the old logging code still needs to be translated to
the new way.

* Statistics rewrite started: Stats are now based on (log)
events. It\'s possible to gather statistics about any event
that is logged. See http://wiki2.dovecot.org/Statistics for
details

* ssl_dh setting replaces the old generated ssl-parameters.dat

* IMAP: When BINARY FETCH finds a broken mails, send [PARSE]
error instead of [UNKNOWNCTE]

* Linux: core dumping via PR_SET_DUMPABLE is no longer enabled
by default due to potential security reasons (found by cPanel
Security Team).
+ Added support for SMTP submission proxy server, which
includes support for BURL and CHUNKING extension.
+ LMTP rewrite. Supports now CHUNKING extension and mixing of
local/proxy recipients.
+ auth: Support libsodium to add support for ARGON2I and
ARGON2ID password schemes.
+ auth: Support BLF-CRYPT password scheme in all platforms
+ auth: Added LUA scripting support for passdb/userdb.
See https://wiki2.dovecot.org/AuthDatabase/Lua
- Input streams are more reliable now when there are errors or
when the maximum buffer size is reached. Previously in some
situations this could have caused Dovecot to try to read
already freed memory.
- Output streams weren\'t previously handling failures when
writing a trailer at the end of the stream. This mainly
affected encrypt and zlib compress ostreams, which could have
silently written truncated files if the last write happened to
fail (which shouldn\'t normally have ever happened).
- virtual plugin: Fixed panic when fetching mails from virtual
mailboxes with IMAP BINARY extension.
- doveadm-server: Fix potential hangs with SSL connections
- doveadm proxy: Reading commands\' output from v2.2.33+ servers
could have caused the output to be corrupted or caused a
crash.
- Many other smaller fixes
- patches:
- dovecot-2.3.0-better_ssl_defaults.patch
- dovecot-2.3.0-dont_use_etc_ssl_certs.patch


 
ICM