eximon-4.88-lp151.4.12.1<>,G^/=„<g07v߀[KUFs)Аe6$^S&s&8G@َ7T6=*Xg]괔]CB@(_ kk3+ұk1~C$*aL$_1bw wg6i[xwIJ* ʤ(6q7}NR[i$Y]X僆8>9wZ~(iF4iɺ<J?A[A ɺ&#>>3?3xd   Y48@DW`i     f hpz(8 9L : F0G00H08I0@X0DY0L\0p]0x^0b0c1=d1e1f1l1u1v1w2x2y2 z33(3,323tCeximon4.88lp151.4.12.1Eximon, an graphical frontend to administer Exim's mail queueThis allows administrators to view the exim agent's mail queue and logs, and perform a variety of actions on queued messages, such as freezing, bouncing and thawing messages, and even editing body and header of mails.^lamb62YopenSUSE Leap 15.1openSUSEGPL-2.0+http://bugs.opensuse.orgProductivity/Networking/Email/Servershttp://www.exim.org/linuxx86_64!h^^2436cc343e21ad7a972f73e89d5ee0850d4b0bd43f1cf62c1176b4206240aaa4cea1e46293d7dd27eb800546f546856a56b904c4f32e5d9aa17ef4925f52494arootrootrootrootexim-4.88-lp151.4.12.1.src.rpmeximoneximon(x86-64)@@@@@@@@@@@@@    /bin/shlibX11.so.6()(64bit)libXaw.so.7()(64bit)libXmu.so.6()(64bit)libXt.so.6()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libpcre.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1^@^[]rJ@]:@\ZZ@Z@Z@Z@YdY[@YGXWW@VV2VVjVqUJ@U0U@TÉ@TÉ@TÉ@TÉ@T@T@T@TuTuwullinger@rz.uni-kiel.dewullinger@rz.uni-kiel.deAlexandros Toptsoglou alex Robert Frohl wullinger@rz.uni-kiel.dedmueller@suse.comkstreitova@suse.commeissner@suse.comrbrown@suse.comdimstar@opensuse.orgmeissner@suse.commeissner@suse.comwullinger@rz.uni-kiel.dee.istomin@edss.eelmuelle@suse.comlmuelle@suse.comopensuse@cboltz.delmuelle@suse.commichal.hrusecky@opensuse.orglmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.commichal.hrusecky@opensuse.orgmichal.hrusecky@opensuse.orglmuelle@suse.comlmuelle@suse.comlmuelle@suse.com- don't create logfiles during install * fixes CVE-2020-8015 (bsc#1154183)- add a spec-file workaround for bsc#1160726- CVE-2019-15846: Fixed a buffer overflow in SMTP Delivery process where a remote attacker could execute code with root privileges by sending crafted SNI data (boo#1149182). backport commit 2600301ba6dbac5c9d640c87007a07ee6dcea1f4 add CVE-2019-15846.patch- CVE-2019-13917: Fixed an issue with ${sort} expansion which could allow remote attackers to execute other programs with root privileges (boo#1142207) backpport of commit 21aa05977abff1eaa69bb97ef99080220915f7c0 add CVE-2019-13917.patch- CVE-2019-10149: Fixed a Remote Command Execution (bsc#1136587) backport of commit d740d2111f189760593a303124ff6b9b1f83453d add CVE-2019-10149.patch- add exim-CVE-2017-16944.patch: backport of commit 178ecb70987f024f0e775d87c2f8b2cf587dd542 fix for CVE-2017-16944 (#bsc1069859)- update to 4.88: drops fix-CVE-2016-9963-31c02defdc5118834e801d4fe8f11c1d9b5ebadf.patch, exim-4.86.2+fixes-867e8fe25dbfb1e31493488ad695bde55b890397.patch - remove exim4-manpages.tar.bz2: upstream does not exist anymore - update keyring- add exim-4.86.2-mariadb_102_compile_fix.patch to fix compilation with the mariadb 10.2 (in our case the build with libmariadb library from the mariadb-connector-c package) * upstream commits: a12400fd4493b676e71613ab429e731f777ebd1e and 31beb7972466a33a88770eacbce13490f2ddadc2- exim-CVE-2017-16943.patch: fixed possible code execution (CVE-2017-16943 bsc#1069857)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Explicitly buildrequire libnsl-devel on suse_version >= 1330: libnsl used to be an integrated part of glibc. Since the build system / makefiles explicitly reference libnsl, it is our own duty to ensure we have our deps in place.- specify users with ref:mail, to make them dynamic. bsc#1046971- exim-CVE-2017-1000369.patch: Fixed memory leaks that could be exploited to "stack crash" local privilege escalation (bsc#1044692) - Require user(mail) group(mail) to meet new users handling in TW. - Prerequire permissions (fixes rpmlint).- conditionally disable DANE on SuSE versions with OpenSSL < 1.0 - exim-4.86.2+fixes-867e8fe25dbfb1e31493488ad695bde55b890397.patch: import exim-4_86_2+fixes branch + fix CVE-2016-1531 when installed setuid root, allows local users to gain privileges via the perl_startup argument. + fix Bug 1805: store the initial working directory, expand $initial_cwd + fix Bug 1671: segfault after delivery (https://bugs.exim.org/show_bug.cgi?id=1671) + Don't issue env warning if env is empty - fix-CVE-2016-9963-31c02defdc5118834e801d4fe8f11c1d9b5ebadf.patch: DKIM information leakage- Makefile tuning: + add sqlite support + disable WITH_OLD_DEMIME + enable AUTH_CYRUS_SASL + enable AUTH_TLS + enable SYSLOG_LONG_LINES + enable SUPPORT_PAM + MAX_NAMED_LIST=64 + enable EXPERIMENTAL_DMARC + enable EXPERIMENTAL_EVENT + enable EXPERIMENTAL_PROXY + enable EXPERIMENTAL_CERTNAMES + enable EXPERIMENTAL_DSN + enable EXPERIMENTAL_DANE + enable EXPERIMENTAL_SOCKS + enable EXPERIMENTAL_INTERNATIONAL- Update to 4.86.2 + Fix minor portability issues for *BSD and OS/X.- Update to 4.86.1 + Add support for keep_environment and add_environment options; CVE-2016-1531; (boo#968844).- Move AppArmor profile to /usr/share/apparmor/extra-profiles/, which is the directory for inactive profiles since AppArmor 2.9- Update the Exim Maintainers Keyring file 'exim.keyring'. - Use URL for the source line of the main tar ball.- Update to 4.86 * Support for using the system standard CA bundle. * New expansion items $config_file, $config_dir, containing the file and directory name of the main configuration file. Also $exim_version. * New "malware=" support for Avast. * New "spam=" variant option for Rspamd. * Assorted options on malware= and spam= scanners. * A commandline option to write a comment into the logfile. * If built with EXPERIMENTAL_SOCKS feature enabled, the smtp transport can be configured to make connections via socks5 proxies. * If built with EXPERIMENTAL_INTERNATIONAL, support is included for the transmission of UTF-8 envelope addresses. * If built with EXPERIMENTAL_INTERNATIONAL, an expansion item for a commonly used encoding of Maildir folder names. * A logging option for slow DNS lookups. * New ${env {}} expansion. * A non-SMTP authenticator using information from TLS client certificates. * Main option "tls_eccurve" for selecting an Elliptic Curve for TLS. Patch originally by Wolfgang Breyha. * Main option "dns_trust_aa" for trusting your local nameserver at the same level as DNSSEC. - Dropped exim-enable_ecdh_openssl.patch as included in upstream- Fix the systemd service file by not passing EXIM_ARGS as one single argument by removing the curly brackets (shell syntax).- Install fitting eximstats.conf depending on SUSE version; (bsc#926861). - Add attribute dir to /etc/apache2 and /etc/apache2/conf.d in the file list.- Replace the fixed ExecStart arguments by ${EXIM_ARGS} as defined in /etc/sysconfig/exim; (bsc#922145).- Set CFLAGS_OPT_WERROR only on post-5 CentOS and RHEL systems.- Drop BuildRequires xorg-x11-server-sdk for non SUSE systems in particular to build on RHEL 6 again.- Let ld know the path to mysqlclient.- update to 4.85 + When running the test suite, the README says that variables such as no_msglog_check are global and can be placed anywhere in a specific test's script, however it was observed that placement needed to be near the beginning for it to behave that way. Changed the runtest perl script to read through the entire script once to detect and set these variables, reset to the beginning of the script, and then run through the script parsing/test process like normal. + Expand the EXPERIMENTAL_TPDA feature. Several different events now cause callback expansion. + Bugzilla 1518: Clarify "condition" processing in routers; that syntax errors in an expansion can be treated as a string instead of logging or causing an error, due to the internal use of bool_lax instead of bool when processing it. + Add EXPERIMENTAL_DANE, allowing for using the DNS as trust-anchor for server certificates when making smtp deliveries. + Support secondary-separator specifier for MX, SRV, TLSA lookups. + Add ${sort {list}{condition}{extractor}} expansion item. + Bugzilla 1216: Add -M (related messages) option to exigrep. + GitHub Issue 18: Adjust logic testing for true/false in redis lookups. Merged patch from Sebastian Wiedenroth. + Fix results-pipe from transport process. Several recipients, combined with certificate use, exposed issues where response data items split over buffer boundaries were not parsed properly. This eventually resulted in duplicates being sent. This issue only became common enough to notice due to the introduction of conection certificate information, the item size being so much larger. Found and fixed by Wolfgang Breyha. + Bug 1533: Fix truncation of items in headers_remove lists. A fixed size buffer was used, resulting in syntax errors when an expansion exceeded it. + Add support for directories of certificates when compiled with a GnuTLS version 3.3.6 or later. + Rename the TPDA expermimental facility to Event Actions. The #ifdef is EXPERIMENTAL_EVENT, the main-configuration and transport options both become "event_action", the variables become $event_name, $event_data and $event_defer_errno. There is a new variable $verify_mode, usable in routers, transports and related events. The tls:cert event is now also raised for inbound connections, if the main configuration event_action option is defined. + In test suite, disable OCSP for old versions of openssl which contained early OCSP support, but no stapling (appears to be less than 1.0.0). + When compiled with OpenSSL and EXPERIMENTAL_CERTNAMES, the checks on server certificate names available under the smtp transport option "tls_verify_cert_hostname" now do not permit multi-component wildcard matches. + Time-related extraction expansions from certificates now use the main option "timezone" setting for output formatting, and are consistent between OpenSSL and GnuTLS compilations. Bug 1541. + Fix a crash in mime ACL when meeting a zero-length, quoted or RFC2047- encoded parameter in the incoming message. Bug 1558. + Bug 1527: Autogrow buffer used in reading spool files. Since they now include certificate info, eximon was claiming there were spoolfile syntax errors. + Bug 1521: Fix ldap lookup for single-attr request, multiple-attr return. + Log delivery-related information more consistently, using the sequence "H= []" wherever possible. + Bug 1547: Omit RFCs from release. Draft and RFCs have licenses which are problematic for Debian distribution, omit them from the release tarball. + Updates and fixes to the EXPERIMENTAL_DSN feature. + Fix string representation of time values on 64bit time_t anchitectures. Bug 1561. + Fix a null-indirection in certextract expansions when a nondefault output list separator was used.- Enable SPF- Fix service file; (boo#935601) - Using bcond for mysql, pgsql and ldap - mysql, pgsql and ldap enabled by default- Removed executable permission bits from exim.service file; (boo#935601).- Remove dependency on gpg-offline as signature checking is implemented in the source validator.- update to 4.84 + Re-add a 'return NULL' to silence complaints from static checkers that were complaining about end of non-void function with no return; (beo#1506); obsoletes silence-static-checkers.patch. + Fix parsing of quoted parameter values in MIME headers. This was a regression intruduced in 4.83 by another bugfix; (beo#1513). + Fix broken compilation when EXPERIMENTAL_DSN is enabled. + Fix exipick for enhanced spoolfile specification used when EXPERIMENTAL_DNS is enabled; (beo#1509).lamb62 15861690934.88-lp151.4.12.14.88-lp151.4.12.1eximoneximon.bin/usr/bin/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:12268/openSUSE_Leap_15.1_Update/e2408b286a335f3be689f82da0cd5ee5-exim.openSUSE_Leap_15.1_Updatedrpmxz5x86_64-suse-linuxPOSIX shell script, ASCII text executableELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, BuildID[sha1]=633c00a9fe0e6cc2bbcf71133b1cc06f0eac1f44, for GNU/Linux 3.2.0, stripped RR RR RR RRRRRR RVt/Z#G\Lutf-8d456f5634cd9133d8e865e6356b44c4c45e0e46138c5360ed40b7da51da53840? 7zXZ !t/#1D]"k%f!-nNUficA"fs ApܖY烿-v l/$ jam rJyݽ/$ 4.lzSJp+ 'Ct)HXwi:Kih? []tO*qlp@z klLRa3BhX?y+VYUP2L);U!H LQ.5zxVLQ ӄ#PHwdhVdx}$V_*(yJnӏ͕rG=|}62ʮju5vpI@-!y䭡{6-ۜ D_7GCA*z("^2՜4=661q=dOlfY7OJ( H.6 6ÔTU^Bڂih9I.r+`ݮ3mu1#4x3=u#ʈxXo4?Ӟ ]2n*0%CRhC)^jy6{k^aw YD8+mW/B=k=WP0wvBokxc/#InH@ FŲr)hd| X; -A H()~ohs˝>ơ^{=h؎SS mbQ5EF~qd1cZ,m@?!$Z]J0 HasKhWBҋB,6Yrh\Jm_l^#79{|lFmavNokPjctlܲ dىb})9ܝKxDԲ%#ƺs$l6uax*Ti U1̾hb|2X aZ=i =muyPnkzZ`QI{=k%+Ud$i'Vu&K2&ظ68h6pyz.B3U멩iVL/}OC{ Pۋ8"rA;Ae! _ۃ~yxٗH_Nc4k #l:تgp=ڸX6UD̘$bz ℅>`F?Y')0t`4'p+M*߽Hc]t_2(q:hpx&6OһDN;@(uǠKsvo5ciԔ`~˯ #n̶2_Y]A3!%~kPWlC| =w^cN@f *>V}oA}F9!%m`fwZ;) zҺNԹsO̱A_QFÍiV8{!(EJ3^øtr|R0[XԵ:J2U#iM&_m& #؇KUQ}V므w& β|b}6q*Ь`7ɇ)d#c$vC ;؝#>wa@T]Hh>̞*G>(nlby2N _"aOLgNQMב2G@LD'ū2m%5MQ]`ɕg*߳3k%qȫ2OhmاU6z9r4&Hj <Ť C$9hÓhojTq3,#$w/!yBHi gDKoMahZD(U4Xf$WP aLN~Wϛ:uT> s} 0SŢ$RB9hk"'#7{ u5]3v='Wr;VF{@U$_[0dۙy'ԺAwH-xBzNgF@ʕgd5Bfe*Z~]m36@V Sh)]^; x}z}oVsO|T1)]>Cus;K tQHsɟVqh vdLlSӯ d JT<4)>s!.\7c.$Σ>& bT( <}c-f@2x&7~{Uu88R}:bX6|B"*)X:vf{i;R oȸ `@ieB=%qTe"Ra$|֙|1)\"6Kq3| "+\E k]I"Wձzmk5f-&~[;vu'F$Rp)/ʑe8`fԸ%p'S݇di.D@1Tlz!T -~3A.M6& vfdc G"-/s ٥RjmeӢ=E=eMt@ɔ8]y4<}ס?9zI.q8{Ho۴q:[#ۇy rrAO$٧({W$Cn~H1Y)'p2hˀci&KzU-6#H2N (7 U` t9#/T?5.KE?B]0J\xZf'W=fheE$Đ9V۳"Wt:=K}dab}"lBoXˣija9;⺠(?rN5{.~E4``[ \VsŴ)E6g9|:Raڤz7ȿR BFBJpk5}sX!4TJ >!GM/@-|'~ #")W34֫gE@jYS|S o5h孝\hϵQ\3 I-'J[=mjQ]]$LNX@od-yKF`F)(& YZ