dovecot23-fts-squat-2.3.3-lp150.14.1<>,cԉ]x`/=„6[s Đ:=e;1>J";$/|e_Wb<$i/, \!WMϞEt57>;i(s`bʚGo>U?Uxd ' L $04GP{     - 049>dh   (8 9:FRGRHRIRXRYR\R]R^RbS cSdTFeTKfTNlTPuTdvThwTxTyUzUU(U,U2UtCdovecot23-fts-squat2.3.3lp150.14.1Fulltext search support squat pluginDovecot is an IMAP and POP3 server for Linux and UNIX-like systems, written primarily with security in mind. Although it is written in C, it uses several coding techniques to avoid most of the common pitfalls. Dovecot can work with standard mbox and maildir formats and is fully compatible with UW-IMAP and Courier IMAP servers as well as mail clients accessing the mailboxes directly. This package holds the files needed for fulltext search support squat plugin.]x`cloud127openSUSE Leap 15.0openSUSEBSD-3-Clause AND LGPL-2.1-or-later AND MIThttp://bugs.opensuse.orgProductivity/Networking/Email/Servershttp://www.dovecot.orglinuxx86_64]x893468ae25f6f83ab9de9e6671fa2b08d535415de231d4a1fc3c5b2a2610abb0rootrootdovecot23-2.3.3-lp150.14.1.src.rpmdovecot23-fts-squatdovecot23-fts-squat(x86-64)lib21_fts_squat_plugin.so()(64bit)@@@@@    dovecot23dovecot23-ftslib20_fts_plugin.so()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.4)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)2.3.32.3.33.0.4-14.6.0-14.0-15.2-14.14.1]V]@\\e\R@\4[ @[ @[H@[E@[7p[ [@Z̧@ZZ2@Z@Z@Z@ZZZZ@@Z@@Z?Z:PPeter Varkoly Peter Varkoly Peter Varkoly Peter Varkoly Peter Varkoly Peter Varkoly Marcus Rueckert Marcus Rueckert mrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.dekbabioch@suse.comvarkoly@suse.commrueckert@suse.demrueckert@suse.dedimstar@opensuse.orgmrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.dejengelh@inai.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- bsc#1133625 - (CVE-2019-11499) VUL-0: CVE-2019-11499: dovecot23: Submission-login crashes over TLS authentication - bsc#1133624 VUL-0: CVE-2019-11494: dovecot23: Submission-login crashes over aborted/disconected authentication applyed upstream patches: dovecot-CVE-2019-11499-fix-pending-starttls.patch dovecot-CVE-2019-11494-fix-disconnects.patch dovecot-CVE-2019-11494-fix-error-handling.patch- bsc#1145559 VUL-0: CVE-2019-11500: dovecot22, dovecot23: IMAP and ManageSieve protocol parsers do not properly handle NUL byte applyed upstream patches: 0001-lib-managesieve-Don-t-accept-strings-with-NULs.patch 0002-lib-managesieve-Make-sure-str_unescape-won-t-be-writ.patch 0001-lib-imap-Don-t-accept-strings-with-NULs.patch 0002-lib-imap-Make-sure-str_unescape-won-t-be-writing-pas.patch- bsc#1132501 VUL-0: EMBARGOED: CVE-2019-10691: dovecot23,dovecot: Escape invalid UTF-8 as unicode bytes applyed upstream patches: 0001-lib-json-Escape-invalid-UTF-8-as-unicode-bytes.patch- bsc#1130116 - (CVE-2019-7524) VUL-0: CVE-2019-7524: FTS or POP3-UIDL header from dovecot index overflow applyed upstream patches: 0001-lib-storage-Fix-buffer-overflow-when-reading-oversiz.patch 0002-fts-Fix-buffer-overflow-when-reading-oversized-fts-h.patch- bsc#1123022 (CVE-2019-3814) Vulnerability in Dovecot related to SSL client certificate authentication applyed upstream patches: 0001-auth-Do-not-import-empty-certificate-username.patch 0002-auth-Fail-authentication-if-certificate-username-was.patch 0003-login-common-Ensure-we-get-username-from-certificate.patch- bsc#1119850 dsync crashes if ACL user identifier is matched and then not matched Was fixed by update to 2.3.3- update pigeonhole to 0.5.3 - Fix assertion panic occurring when managesieve service fails to open INBOX while saving a Sieve script. This was caused by a lack of cleanup after failure. - Fix specific messages causing an assert panic with actions that compose a reply (e.g. vacation). With some rather weird input from the original message, the header folding algorithm (as used for composing the References header for the reply) got confused, causing the panic. - IMAP FILTER=SIEVE capability: Fix FILTER SIEVE SCRIPT command parsing. After finishing reading the Sieve script, the command parsing sometimes didn't continue with the search arguments. This is a time- critical bug that likely only occurs when the Sieve script is sent in the next TCP frame.- update to 2.3.3 * doveconf hides more secrets now in the default output. * ssl_dh setting is no longer enforced at startup. If it's not set and non-ECC DH key exchange happens, error is logged and client is disconnected. + Added log_debug= setting. + Added log_core_filter= setting. + quota-clone: Write to dict asynchronously + --enable-hardening attempts to use retpoline Spectre 2 mitigations + lmtp proxy: Support source_ip passdb extra field. + doveadm stats dump: Support more fields and output stddev by default. + push-notification: Add SSL support for OX backend. - NUL bytes in mail headers can cause truncated replies when fetched. - director: Conflicting host up/down state changes may in some rare situations ended up in a loop of two directors constantly overwriting each others' changes. - director: Fix hang/crash when multiple doveadm commands are being handled concurrently. - director: Fix assert-crash if doveadm disconnects too early - virtual plugin: Some searches used 100% CPU for many seconds - dsync assert-crashed with acl plugin in some situations. - mail_attachment_detection_options=add-flags-on-save assert-crashed with some specific Sieve scripts. - Mail snippet generation crashed with mails containing invalid Content-Type:multipart header. - Log prefix ordering was different for some log lines. - quota: With noenforcing option current quota usage wasn't updated. - auth: Kerberos authentication against Samba assert-crashed. - stats clients were unnecessarily chatty with the stats server. - imapc: Fixed various assert-crashes when reconnecting to server. - lmtp, submission: Fix potential crash if client disconnects while handling a command. - quota: Fixed compiling with glibc-2.26 / support libtirpc. - fts-solr: Empty search values resulted in 400 Bad Request errors - fts-solr: default_ns parameter couldn't be used - submission server crashed if relay server returned over 7 lines in a reply (e.g. to EHLO) - dropped 4ff4bd024a9b6e7973b76b186ce085c2ca669d3e.patch: included in update- added https://github.com/dovecot/core/commit/4ff4bd024a9b6e7973b76b186ce085c2ca669d3e.patch- update to 2.3.2.1 - SSL/TLS servers may have crashed during client disconnection - lmtp: With lmtp_rcpt_check_quota=yes mail deliveries may have sometimes assert-crashed. - v2.3.2: "make check" may have crashed with 32bit systems- update to 2.3.2 * old-stats plugin: Don't temporarily enable PR_SET_DUMPABLE while opening /proc/self/io. This may still cause security problems if the process is ptrace()d at the same time. Instead, open it while still running as root. + doveadm: Added mailbox cache decision&remove commands. See doveadm-mailbox(1) man page for details. + doveadm: Added rebuild attachments command for rebuilding $HasAttachment or $HasNoAttachment flags for matching mails. See doveadm-rebuild(1) man page for details. + cassandra: Use fallback_consistency on more types of errors + lmtp proxy: Support outgoing SSL/TLS connections + lmtp: Add lmtp_rawlog_dir and lmtp_proxy_rawlog_dir settings. + submission: Add support for rawlog_dir + submission: Add submission_client_workarounds setting. + lua auth: Add password_verify() function and additional fields in auth request. - doveadm-server: TCP connections are hanging when there is a lot of network output. This especially caused hangs in dsync-replication. - Using multiple type=shared mdbox namespaces crashed - mail_fsync setting was ignored. It was always set to "optimized". - lua auth: Fix potential crash at deinit - SSL/TLS servers may have crashed if client disconnected during handshake. - SSL/TLS servers: Don't send extraneous certificates to client when alt certs are used. - lda, lmtp: Return-Path header without '<' may have assert-crashed. - lda, lmtp: Unencoded UTF-8 in email address headers may assert-crash - lda: -f parameter didn't allow empty/null/domainless address - lmtp, submission: Message size limit was hardcoded to 40 MB. Exceeding it caused the connection to get dropped during transfer. - lmtp: Fix potential crash when delivery fails at DATA stage - lmtp: login_greeting setting was ignored - Fix to work with OpenSSL v1.0.2f - systemd unit restrictions were too strict by default - Fix potential crashes when a lot of log output was produced - SMTP client may have assert-crashed when sending mail - IMAP COMPRESS: Send "end of compression" marker when disconnecting. - cassandra: Fix consistency=quorum to work - dsync: Lock file generation failed if home directory didn't exist - Snippet generation for HTML mails didn't ignore &entities inside blockquotes, producing strange looking snippets. - imapc: Fix assert-crash if getting disconnected and after reconnection all mails in the selected mailbox are gone. - pop3c: Handle unexpected server disconnections without assert-crash - fts: Fixes to indexing mails via virtual mailboxes. - fts: If mails contained NUL characters, the text around it wasn't indexed. - Obsolete dovecot.index.cache offsets were sometimes used. Trying to fetch a field that was just added to cache file may not have always found it. - update pigeonhole to 0.5.2 + Implement plugin for the a vendor-defined IMAP capability called "FILTER=SIEVE". It adds the ability to manually invoke Sieve filtering in IMAP. More information can be found in doc/plugins/imap_filter_sieve.txt. - The Sieve addess test caused an assertion panic for invalid addresses with UTF-8 codepoints in the localpart. Fixed by properly detecting invalid addresses with UTF-8 codepoints in the localpart and skipping these like other invalid addresses while iterating addresses for the address test. - Make the length of the subject header for the vacation response configurable and enforce the limit in UTF-8 codepoints rather than bytes. The subject header for a vacation response was statically truncated to 256 bytes, which is too limited for multi-byte UTF-8 characters. - Sieve editheader extension: Fix assertion panic occurring when it is used to manipulate a message header with a very large header field. - Properly abort execution of the sieve_discard script upon error. Before, the LDA Sieve plugin attempted to execute the sieve_discard script when an error occurs. This can lead to the message being lost. - Fix the interaction between quota and the sieve_discard script. When quota was used together with a sieve_discard script, the message delivery did not bounce when the quota was exceeded. - refreshed to apply cleanly again dovecot-2.3.0-better_ssl_defaults.patch - dropped patches: - 35497604d80090a02619024aeec069b32568e4b4.diff - 5522b8b3d3ed1a99c3b63bb120216af0bd427403.diff - 847790d5aab84df38256a6f9b4849af0eb408419.patch- added 847790d5aab84df38256a6f9b4849af0eb408419.patch: Fix crash for over quota users- Use OpenPGP signatures provided upstream - Added dovecot23.keyring, which contains the keys from the upstream projects- bnc#1088911 - dovecot23 can not build ond s390 add: 35497604d80090a02619024aeec069b32568e4b4.diff add: 5522b8b3d3ed1a99c3b63bb120216af0bd427403.diff- update pigeonhole to 0.5.1 - Explicitly disallow UTF-8 in localpart in addresses parsed from Sieve script. - editheader extension: Corrected the stream position calculations performed while making the modified message available as a stream. Pigeonhole Sieve crashed in LMTP with an assertion panic when the Sieve editheader extension was used before the message was redirected. Experiments indicate that the problem occurred only with LMTP and that LDA is not affected. - fileinto extension: Fix assert panic occurring when fileinto is used without being listed in the require line, while the copy extension is listed there. This is a very old bug. - imapsieve plugin: Do not assert crash or log an error for messages that disappear concurrently while applying Sieve scripts. This event is now logged as a debug message. - Sieve extprograms plugin: Large output from "execute" command crashed delivery. Fixed buffering issue in code that handles output from the external program.- update to 2.3.1 * Submission server support improvements and bug fixes - Lots of bug fixes to submission server * API CHANGE: array_idx_modifiable will no longer allocate space - Particularly affects how you should check MODULE_CONTEXT result, or use REQUIRE_MODULE_CONTEXT. + mail_attachment_detection_options setting controls when $HasAttachment and $HasNoAttachment keywords are set for mails. + imap: Support fetching body snippets using FETCH (SNIPPET) or (SNIPPET (LAZY=FUZZY)) + fs-compress: Automatically detect whether input is compressed or not. Prefix the compression algorithm with "maybe-" to enable the detection, for example: "compress:maybe-gz:6:..." + Added settings to change dovecot.index* files' optimization behavior. See https://wiki2.dovecot.org/IndexFiles#Settings + Auth cache can now utilize auth workers to do password hash verification by setting auth_cache_verify_password_with_worker=yes. + Added charset_alias plugin. See https://wiki2.dovecot.org/Plugins/CharsetAlias + imap_logout_format and pop3_logout_format settings now support all of the generic variables (e.g. %{rip}, %{session}, etc.) + Added auth_policy_check_before_auth, auth_policy_check_after_auth and auth_policy_report_after_auth settings. + master: Support HAProxy PP2_TYPE_SSL command and set "secured" variable appropriately - Invalid UCS4 escape in HTML can cause crashes - imap: IMAP COMPRESS -enabled client crashes on disconnect - lmtp: Fix crash when user is over quota - lib-lda: Parsing Return-Path header address fails when it contains CFWS - auth: SASL with Exim fails for AUTH commands without an initial response - imap: SPECIAL-USE capability isn't automatically added - auth: LDAP subqueries do not support standard auth variables in var-expand - auth: SHA256-CRYPT and SHA512-CRYPT schemes do not work - lib-index: mail_always/never_cache_fields are not used for existing cache files - imap: Fetching headers leaks memory if search doesn't find any mails - lmtp: ORCPT support in RCPT TO - imap-login: Process sometimes ends up in infinite loop - sdbox: Rolled back save/copy transaction doesn't delete temp files - mail: lock_method=dotlock causes crashes - drop patches which are included in the update 23da0fa1b30cc11bcc1d467674a0950c527e9ff1.patch dovecot-2.3.0.1-over-quota-lmtp-crash.patch- Fix License tag.- added 23da0fa1b30cc11bcc1d467674a0950c527e9ff1.patch- update license to SPDX-3- update pigeonhole to 0.5.0.1 - imap4flags extension: Fix binary corruption occurring when setflag/addflag/removeflag flag-list is a variable. - sieve-extprograms plugin: Fix segfault occurring when used in IMAPSieve context. - drop 321a39be974deb2e7eff7b2a509a3ee6ff2e5ae1.patch- pull backport patch dovecot-2.3.0.1-over-quota-lmtp-crash.patch- update to 2.3.0.1 * CVE-2017-15130: TLS SNI config lookups may lead to excessive memory usage, causing imap-login/pop3-login VSZ limit to be reached and the process restarted. This happens only if Dovecot config has local_name { } or local { } configuration blocks and attacker uses randomly generated SNI servernames. (boo#1082828) * CVE-2017-14461: Parsing invalid email addresses may cause a crash or leak memory contents to attacker. For example, these memory contents might contain parts of an email from another user if the same imap process is reused for multiple users. First discovered by Aleksandar Nikolic of Cisco Talos. Independently also discovered by "flxflndy" via HackerOne. (boo#1082826) * CVE-2017-15132: Aborted SASL authentication leaks memory in login process. (boo#1075608) * Linux: Core dumping is no longer enabled by default via PR_SET_DUMPABLE, because this may allow attackers to bypass chroot/group restrictions. Found by cPanel Security Team. Nowadays core dumps can be safely enabled by using "sysctl -w fs.suid_dumpable=2". If the old behaviour is wanted, it can still be enabled by setting: import_environment=$import_environment PR_SET_DUMPABLE=1 - imap-login with SSL/TLS connections may end up in infinite loop- Replace %__-type macro indirections. Replace xargs rm by built in -delete of find(1). - Run ldconfig directly via %post -p. - Check for users in %pre before creating them, and do not suppress errors about it.- backport 321a39be974deb2e7eff7b2a509a3ee6ff2e5ae1.patch fixes crash with imap sieve- Move the example-config + mkcert.sh to /usr/share/dovecot This makes the files no longer documentation and they actually exist on e.g. our docker image, where rpms are installed without documentation. (boo#1070871)- starting 2.3 package based on the latest 2.2 branch There are several new and exciting features in v2.3.0. I'm especially happy about the new logging and statistics code, which will allow us to generate statistics for just about everything. We didn't have time to implement everything we wanted for them yet, and there especially aren't all that many logging events yet that can be used for statistics. We'll implement those to v2.3.1, which might also mean that some of the APIs might still change in v2.3.1 if that's required. We also have new lib-smtp server code, which was used to implement SMTP submission server and do a partial rewrite for LMTP server. Some of the larger changes: * Various setting changes, see https://wiki2.dovecot.org/Upgrading/2.3 If you upgrade from 2.2: Config file changes: - Removed: /etc/dovecot/conf.d/11-object-storage.conf - Added: /etc/dovecot/conf.d/20-submission.conf * Logging rewrite started: Logging is now based on hierarchical events. This makes it possible to do various things, like: 1) giving consistent log prefixes, 2) enabling debug logging with finer granularity, 3) provide logs in more machine readable formats (e.g. json). Everything isn't finished yet, especially a lot of the old logging code still needs to be translated to the new way. * Statistics rewrite started: Stats are now based on (log) events. It's possible to gather statistics about any event that is logged. See http://wiki2.dovecot.org/Statistics for details * ssl_dh setting replaces the old generated ssl-parameters.dat * IMAP: When BINARY FETCH finds a broken mails, send [PARSE] error instead of [UNKNOWNCTE] * Linux: core dumping via PR_SET_DUMPABLE is no longer enabled by default due to potential security reasons (found by cPanel Security Team). + Added support for SMTP submission proxy server, which includes support for BURL and CHUNKING extension. + LMTP rewrite. Supports now CHUNKING extension and mixing of local/proxy recipients. + auth: Support libsodium to add support for ARGON2I and ARGON2ID password schemes. + auth: Support BLF-CRYPT password scheme in all platforms + auth: Added LUA scripting support for passdb/userdb. See https://wiki2.dovecot.org/AuthDatabase/Lua - Input streams are more reliable now when there are errors or when the maximum buffer size is reached. Previously in some situations this could have caused Dovecot to try to read already freed memory. - Output streams weren't previously handling failures when writing a trailer at the end of the stream. This mainly affected encrypt and zlib compress ostreams, which could have silently written truncated files if the last write happened to fail (which shouldn't normally have ever happened). - virtual plugin: Fixed panic when fetching mails from virtual mailboxes with IMAP BINARY extension. - doveadm-server: Fix potential hangs with SSL connections - doveadm proxy: Reading commands' output from v2.2.33+ servers could have caused the output to be corrupted or caused a crash. - Many other smaller fixes - patches: - dovecot-2.3.0-better_ssl_defaults.patch - dovecot-2.3.0-dont_use_etc_ssl_certs.patchcloud127 15700112322.3.3-lp150.14.12.3.3-lp150.14.1lib21_fts_squat_plugin.so/usr/lib64/dovecot/modules/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:11183/openSUSE_Leap_15.0_Update/65e6a3b9f911de92eb7615f61762a30d-dovecot23.openSUSE_Leap_15.0_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=251fbd4e2705940828000700f67c8da6c9ef887e, strippedPRRRRR#:|k +uGO.utf-84295a7da3729b5d671b685bc33c9d3b6194ce29c9269a283dea98f49db598e8c? 7zXZ !t/[ ]"k%URipnQթ/PܔEދ蓰=KshpA.Ut=jz&;zP`Cgt" FARGddl(ʄ:=?qxfCao\T:E>2,7ćIM?\'*"?tNJyn\ޤyӂ94e/Vp ab"~yݵG2a[W}/_o~3<02jxP'8=8x/ JG(>%XpIi_>Ս5irdw|v"/3a+.| '_}k3uuԭrb`ϼKHZƕ;1ҫ0ZwNM:c0Lk#d&S^ZpF~aqc_2C0]K!lzzޮ4@뢪0ӌyo>Â"nm3]3cn@Š MܴA4F[ƴ4 ,h~MzzW{o w$ "O4Kg].妦>=I.M[->w6KCitV`[i)L&sfVʩ-!3-tb@kE`.91~ҕD[pXﹺx]MlK0lx'IC޳cEsn-~K߆'ok-nlTww.\6·W2qE.6Şۺk~m9*it][A%mBL!}8[B_bDiQ^GFGx 〠Peelω) %vmR{D9QǑkKoեJPa7)5(YŌֻȞˆyק~st(F*2ysA4 &7zP֢k.q's-E@m݇`9/zL5Tc0tR߸o7\##6> VЕ*B^-[7q)`C˺0' ۢf S}R:oPC #nlIn n*(vtl0j \ɠRw&]ż"ɋ `k -&V٧ \.VK:bxz#QYaҔNƴIcWTZl VNًFe TG1ٞ^8ؙ$+*T"Sc(y6dOj!ت;l%1F3JSnP%K^'h)thJ}=1rS*؉'vHY0-~ouu˜ghjKMHѤέ pi$ +VC0])UGC_io|j1Fg=iuRo"e %'3#Eץ"yَH"* LY{ OCՎ޺J\u G)o32bWVzs)TEP'LV P8zS/zW ӾQ*؎1?m_'31V\ ьL>D4JrHFYg ܮ/ S-0 ^!7tJ~~ca4=MoLӭOjV* +6%~[MWV$sh[ WW_ʯ(s0R0$_!<&ojMf)kHS z.#PqF G"/<٘]9vBDWĎw\q|jIFc@0VXbAUuʬyg>Ih\ @<UI:-sV.륑ڻT.ӓHUZwbо85C%u^zA*# ᣴnfol1 \*ŕq_ 8S=WٺZ=e|Wٸ5o:PSOIˢ:}غb]p虓dZ[;X[!eH$d{wiCbQMo&v1"**뉴nHJCq5i\ Ţjޥ3I;5pV]nK ,-3gP* ar3ݱ,abO;W òŨ\Uc#`:scK%: 7B1Z9gHJxխVt3.{ZXN$=]_"58KɛAUy"sCR[YKX(m)Î⼉Ru0G̬peq_sH;U6j4mF'`/w @:DS1W]Ut,,z|ˆ%Dt!r ȨZ*Bȕ:5 YZ