Bug#1003293: buster-pu: package postfix/3.4.14-0+deb10u1

2022-03-21 Thread Scott Kitterman
On Saturday, March 19, 2022 12:42:32 PM EDT Adam D. Barratt wrote:
> Control: tags -1 + confirmed
> 
> On Fri, 2022-01-07 at 13:01 -0500, Scott Kitterman wrote:
> > This is similar to #1003261 for bullseye, although there are fewer
> > Debian specific changes because most weren't applicable to or would
> > have
> > been more invasive for buster.
> > 
> > I've put together my usual postfix post-release update.  Because I'm
> > behind, it's rather larger than usual.  Also, a number of packaging
> > bugs
> > that apply to buster have been recently fixed in Bookworm, so the low
> 
> Please feel free to go ahead; sorry for the delay.

Uploaded.

Scott K

signature.asc
Description: This is a digitally signed message part.


Bug#1003293: buster-pu: package postfix/3.4.14-0+deb10u1

2022-03-19 Thread Adam D. Barratt
Control: tags -1 + confirmed

On Fri, 2022-01-07 at 13:01 -0500, Scott Kitterman wrote:
> This is similar to #1003261 for bullseye, although there are fewer
> Debian specific changes because most weren't applicable to or would
> have
> been more invasive for buster.
> 
> I've put together my usual postfix post-release update.  Because I'm
> behind, it's rather larger than usual.  Also, a number of packaging
> bugs
> that apply to buster have been recently fixed in Bookworm, so the low
> 

Please feel free to go ahead; sorry for the delay.

Regards,

Adam



Bug#1003293: buster-pu: package postfix/3.4.14-0+deb10u1

2022-01-07 Thread Scott Kitterman
Debdiff attached.

Scott Kdiff -Nru postfix-3.4.14/debian/changelog postfix-3.4.23/debian/changelog
--- postfix-3.4.14/debian/changelog	2020-06-29 21:33:31.0 -0400
+++ postfix-3.4.23/debian/changelog	2022-01-07 11:04:17.0 -0500
@@ -1,3 +1,247 @@
+postfix (3.4.23-0+deb10u1) buster; urgency=medium
+
+  [Scott Kitterman]
+
+  * Refresh patches
+  * Update d/p/70_postfix-check.diff to exclude makedefs.out from synlink
+check.  Closes: #926331
+  * Do not override user set default_transport in postinst.  Closes: #988538
+  * Remove left-over ca-certificates.crt file from postfix chroot. 
+Closes: #991609
+  * Add information about keeping resolv.conf up to date in the chroot with
+the resolvconf package.  Closes: #964762
+
+  [Sergio Gelato]
+
+  * Correct if-up.d to not error out if postfix can't send mail yet. 
+Closes: #959864
+
+  [Paride Legovini]
+
+  * d/postfix.postinst: tolerate search domain with a leading dot. 
+Closes: #991950
+
+  [Wietse Venema]
+
+  * 3.4.15
+- Bugfix (introduced: Postfix 3.0): minor memory leaks in the
+  Postfix TLS library, found during tests. File: tls/tls_misc.c.
+
+- Bugfix (introduced: Postfix 3.0): 4kbyte per session memory
+  leak in the Postfix TLS library, found during tests. File:
+  tls/tls_misc.c.
+
+- Workaround for distros that override Postfix protocol
+  settings in a system-wide OpenSSL configuration file, causing
+  interoperability problems after an OS update. File:
+  tls/tls_client.c, tls/tls_server.c.
+
+  * 3.4.16
+- Bugfix (introduced: Postfix 3.4.15): part of a memory leak
+  fix was backported to the wrong place. File: tls/tls_misc.c.
+
+- The Postfix 3.4.15 workaround did not explictly override
+  the system-wide OpenSSL configuration of allowed TLS protocol
+  versions, for sessions where the remote SMTP client sends
+  SNI. It's better to be safe than sorry. File: tls/tls_server.c.
+
+  * 3.4.17
+- Bugfix (introduced: Postfix 3.4, already fixed in Postfix
+  3.6): tlsproxy(8) was using the wrong DANE macro for
+  connections with DANE trust anchors or with non-DANE trust
+  anchors (WTF: Thorsten Habich found this bug in the use
+  case that has nothing to do with DANE). This resulted in a
+  global certificate verify function pointer race, between
+  TLS handshakes that use TLS trust achors and handshakes
+  that use PKI. No memory was corrupted in the course of all
+  this.  Viktor Dukhovni. File: tlsproxy/tlsproxy.c.
+
+- Cleanup: the posttls-finger '-X' option reported a false
+  conflict with '-r'.  File: posttls-finger/posttls-finger.c.
+
+  * 3.4.18
+- Bugfix (introduced: Postfix 2.0): smtp_sasl_mechanism_filter
+  ignored table lookup errors, treating them as 'not found'.
+  Found during Postfix 3.6 development. File: smtp/smtp_sasl_proto.c.
+
+- Bugfix (introduced: Postfix 2.3): when deleting a recipient
+  with a milter, delete the recipient from the duplicate
+  filter, so that the recipient can be added back. Backported
+  from Postfix 3.6. Files: global/been_here.[hc],
+  cleanup/cleanup_milter.c.
+
+- Bugfix (introduced: before Postfix alpha): the code that
+  looks for Delivered-To: headers ignored headers longer than
+  $line_length_limit. Backported from Postfix 3.6. File:
+  global/delivered_hdr.c.
+
+- Bugfix (introduced: Postfix 2.8): save a copy of the
+  postscreen_dnsbl_reply_map lookup result. This has no effect
+  when the recommended texthash: look table is used, but it
+  may avoid stale data with other lookup tables. File:
+  postscreen/postscreen_dnsbl.c.
+
+- Bugfix (introduced: Postfix 2.2): after processing an
+  XCCLIENT command, the smtps service was waiting for a TLS
+  handshake. Found by Aki Tuomi. File: smtpd/smtpd.c.
+
+- Bugfix (introduced: Postfix 2.3): static maps did not free
+  their casefolding buffer. File: util/dict_static.c.
+
+  * 3.4.19
+- Feature: when a Postfix program makes a DNS query that
+  requests DNSSEC validation (usually for Postfix DANE support)
+  but the DNS response is not DNSSEC validated, Postfix will
+  send a DNS query configured with the "dnssec_probe" parameter
+  to determine if DNSSEC support is available, and logs a
+  warning if it is not. By default, the probe has type "ns"
+  and domain name ".". The probe is sent once per process
+  lifetime. Files: dns/dns.h, dns/dns_lookup.c, dns/dns_sec.c,
+  test_dns_lookup.c, global/mail_params.[hc], mantools/postlink.
+
+- The default "smtp_tls_dane_insecure_mx_policy = dane" was
+  causing unnecessary dnssec_probe activity. The default is now
+  "dane" when smtp_tls_security_level is "dane", otherwise it is
+  "may". File: global/mail_params.h.
+
+  * 3.4.20
+- Missing null pointer checks (introduced: Postfix 3.4) after
+  an internal I/O error 

Bug#1003293: buster-pu: package postfix/3.4.14-0+deb10u1

2022-01-07 Thread Scott Kitterman
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu

This is similar to #1003261 for bullseye, although there are fewer
Debian specific changes because most weren't applicable to or would have
been more invasive for buster.

I've put together my usual postfix post-release update.  Because I'm
behind, it's rather larger than usual.  Also, a number of packaging bugs
that apply to buster have been recently fixed in Bookworm, so the low
risk changes there have been backported too.

The diff is rather large, so I don't include it in the original bug
report to increase the chances this makes it to the mailing list.

Also, as usual, I have this update ready to upload and running in
production locally.

Here is the debian/changelog entry for this update:

postfix (3.4.23-0+deb10u1) buster; urgency=medium

  [Scott Kitterman]

  * Refresh patches
  * Update d/p/70_postfix-check.diff to exclude makedefs.out from synlink
check.  Closes: #926331
  * Do not override user set default_transport in postinst.  Closes: #988538
  * Remove left-over ca-certificates.crt file from postfix chroot.
Closes: #991609
  * Add information about keeping resolv.conf up to date in the chroot with
the resolvconf package.  Closes: #964762

  [Sergio Gelato]

  * Correct if-up.d to not error out if postfix can't send mail yet.
Closes: #959864

  [Paride Legovini]

  * d/postfix.postinst: tolerate search domain with a leading dot.
Closes: #991950

  [Wietse Venema]

  * 3.4.15
- Bugfix (introduced: Postfix 3.0): minor memory leaks in the
  Postfix TLS library, found during tests. File: tls/tls_misc.c.

- Bugfix (introduced: Postfix 3.0): 4kbyte per session memory
  leak in the Postfix TLS library, found during tests. File:
  tls/tls_misc.c.

- Workaround for distros that override Postfix protocol
  settings in a system-wide OpenSSL configuration file, causing
  interoperability problems after an OS update. File:
  tls/tls_client.c, tls/tls_server.c.

  * 3.4.16
- Bugfix (introduced: Postfix 3.4.15): part of a memory leak
  fix was backported to the wrong place. File: tls/tls_misc.c.

- The Postfix 3.4.15 workaround did not explictly override
  the system-wide OpenSSL configuration of allowed TLS protocol
  versions, for sessions where the remote SMTP client sends
  SNI. It's better to be safe than sorry. File: tls/tls_server.c.

  * 3.4.17
- Bugfix (introduced: Postfix 3.4, already fixed in Postfix
  3.6): tlsproxy(8) was using the wrong DANE macro for
  connections with DANE trust anchors or with non-DANE trust
  anchors (WTF: Thorsten Habich found this bug in the use
  case that has nothing to do with DANE). This resulted in a
  global certificate verify function pointer race, between
  TLS handshakes that use TLS trust achors and handshakes
  that use PKI. No memory was corrupted in the course of all
  this.  Viktor Dukhovni. File: tlsproxy/tlsproxy.c.

- Cleanup: the posttls-finger '-X' option reported a false
  conflict with '-r'.  File: posttls-finger/posttls-finger.c.

  * 3.4.18
- Bugfix (introduced: Postfix 2.0): smtp_sasl_mechanism_filter
  ignored table lookup errors, treating them as 'not found'.
  Found during Postfix 3.6 development. File: smtp/smtp_sasl_proto.c.

- Bugfix (introduced: Postfix 2.3): when deleting a recipient
  with a milter, delete the recipient from the duplicate
  filter, so that the recipient can be added back. Backported
  from Postfix 3.6. Files: global/been_here.[hc],
  cleanup/cleanup_milter.c.

- Bugfix (introduced: before Postfix alpha): the code that
  looks for Delivered-To: headers ignored headers longer than
  $line_length_limit. Backported from Postfix 3.6. File:
  global/delivered_hdr.c.

- Bugfix (introduced: Postfix 2.8): save a copy of the
  postscreen_dnsbl_reply_map lookup result. This has no effect
  when the recommended texthash: look table is used, but it
  may avoid stale data with other lookup tables. File:
  postscreen/postscreen_dnsbl.c.

- Bugfix (introduced: Postfix 2.2): after processing an
  XCCLIENT command, the smtps service was waiting for a TLS
  handshake. Found by Aki Tuomi. File: smtpd/smtpd.c.

- Bugfix (introduced: Postfix 2.3): static maps did not free
  their casefolding buffer. File: util/dict_static.c.

  * 3.4.19
- Feature: when a Postfix program makes a DNS query that
  requests DNSSEC validation (usually for Postfix DANE support)
  but the DNS response is not DNSSEC validated, Postfix will
  send a DNS query configured with the "dnssec_probe" parameter
  to determine if DNSSEC support is available, and logs a
  warning if it is not. By default, the probe has type "ns"
  and domain name ".". The probe is sent once per process
  lifetime. Files: dns/dns.h,