[packages/opendmarc] Rel 2; fixes from debian
arekm
arekm at pld-linux.org
Thu Mar 13 11:10:58 CET 2025
commit 51a5a3bf0dc4f50815fa663565787a3ee1c365f3
Author: Arkadiusz Miśkiewicz <arekm at maven.pl>
Date: Thu Mar 13 10:06:24 2025 +0100
Rel 2; fixes from debian
arc-override-quarantine.patch | 71 ++++++++++++++
arcares-segfaults.patch | 49 ++++++++++
arcseal-segfaults.patch | 50 ++++++++++
check-correct-domain.patch | 22 +++++
check_domain.patch | 22 +++++
cleanup-buflen.patch | 22 +++++
conf_refcnt.patch | 22 +++++
cve-2024-25768.patch | 22 +++++
free-arcdomain.patch | 25 +++++
insheader.patch | 49 ++++++++++
opendmarc-1.4.0-remove-docs-configure.patch | 27 ++++++
opendmarc.spec | 35 ++++++-
parse-arc-leaks.patch | 35 +++++++
ticket168.patch | 141 ++++++++++++++++++++++++++++
ticket193.patch | 108 +++++++++++++++++++++
ticket204.patch | 40 ++++++++
ticket207.patch | 49 ++++++++++
ticket208.patch | 131 ++++++++++++++++++++++++++
ticket212.patch | 27 ++++++
19 files changed, 946 insertions(+), 1 deletion(-)
---
diff --git a/opendmarc.spec b/opendmarc.spec
index 7a711ab..d42e03f 100644
--- a/opendmarc.spec
+++ b/opendmarc.spec
@@ -6,12 +6,29 @@
Summary: DMARC milter and library
Name: opendmarc
Version: %{ver_dot}
-Release: 1
+Release: 2
License: BSD
Group: Daemons
Source0: https://github.com/trusteddomainproject/OpenDMARC/archive/refs/tags/rel-%{name}-%{ver}.tar.gz
# Source0-md5: 658d951db84a0305b0c5d9312eff5b64
Source1: %{name}.tmpfiles
+Patch0: ticket168.patch
+Patch1: ticket193.patch
+Patch2: ticket204.patch
+Patch3: ticket207.patch
+Patch4: ticket208.patch
+Patch5: ticket212.patch
+Patch6: insheader.patch
+Patch7: check_domain.patch
+Patch8: arcseal-segfaults.patch
+Patch9: conf_refcnt.patch
+Patch10: free-arcdomain.patch
+Patch11: arc-override-quarantine.patch
+Patch12: cleanup-buflen.patch
+Patch13: check-correct-domain.patch
+Patch14: arcares-segfaults.patch
+Patch15: parse-arc-leaks.patch
+Patch16: cve-2024-25768.patch
URL: http://www.trusteddomain.org/opendmarc.html
BuildRequires: libspf2-devel
BuildRequires: pkgconfig
@@ -49,6 +66,22 @@ files required for developing applications against libopendmarc.
%prep
%setup -q -n OpenDMARC-rel-%{name}-%{ver}
+%patch -P1 -p1
+%patch -P2 -p1
+%patch -P3 -p1
+%patch -P4 -p1
+%patch -P5 -p1
+%patch -P6 -p1
+%patch -P7 -p1
+%patch -P8 -p1
+%patch -P9 -p1
+%patch -P10 -p1
+%patch -P11 -p1
+%patch -P12 -p1
+%patch -P13 -p1
+%patch -P14 -p1
+%patch -P15 -p1
+%patch -P16 -p1
%build
autoreconf -v -i
diff --git a/arc-override-quarantine.patch b/arc-override-quarantine.patch
new file mode 100644
index 0000000..3dfdb8d
--- /dev/null
+++ b/arc-override-quarantine.patch
@@ -0,0 +1,71 @@
+From: "@KIC-8462852" <>
+Date: Tue, 18 Jan 2022 11:57:01 -0500
+Subject: Add ARC override for policy "quarantine"
+
+Origin: other, https://github.com/trusteddomainproject/OpenDMARC/files/6697440/opendmarc-arc-overwrite-for-quarantines-patch.txt
+Bug: https://github.com/trusteddomainproject/OpenDMARC/issues/24
+---
+ opendmarc/opendmarc.c | 29 +++++++++++++++++------------
+ 1 file changed, 17 insertions(+), 12 deletions(-)
+
+diff --git a/opendmarc/opendmarc.c b/opendmarc/opendmarc.c
+index be3d496..9317817 100644
+--- a/opendmarc/opendmarc.c
++++ b/opendmarc/opendmarc.c
+@@ -3637,16 +3637,7 @@ mlfi_eom(SMFICTX *ctx)
+ conf->conf_holdquarantinedmessages &&
+ random() % 100 < pct)
+ {
+- snprintf(replybuf, sizeof replybuf,
+- "quarantined by DMARC policy for %s",
+- pdomain);
+-
+- status = smfi_quarantine(ctx, replybuf);
+- if (status != MI_SUCCESS && conf->conf_dolog)
+- {
+- syslog(LOG_ERR, "%s: smfi_quarantine() failed",
+- dfc->mctx_jobid);
+- }
++ /* quarantine will be deferred to after the ARC policy eval */
+
+ ret = SMFIS_ACCEPT;
+ result = DMARC_RESULT_QUARANTINE;
+@@ -3683,7 +3674,7 @@ mlfi_eom(SMFICTX *ctx)
+ ** arc.chain to assist with administrative debugging.
+ */
+
+- if (result == DMARC_RESULT_REJECT &&
++ if ((result == DMARC_RESULT_REJECT || result == DMARC_RESULT_QUARANTINE) &&
+ dfc->mctx_arcpass == ARES_RESULT_PASS &&
+ dfc->mctx_arcpolicypass != DMARC_ARC_POLICY_RESULT_PASS &&
+ conf->conf_dolog)
+@@ -3693,7 +3684,7 @@ mlfi_eom(SMFICTX *ctx)
+ dfc->mctx_jobid);
+ }
+
+- if (result == DMARC_RESULT_REJECT &&
++ if ((result == DMARC_RESULT_REJECT || result == DMARC_RESULT_QUARANTINE) &&
+ dfc->mctx_arcpolicypass == DMARC_ARC_POLICY_RESULT_PASS)
+ {
+ ret = SMFIS_ACCEPT;
+@@ -3706,6 +3697,20 @@ mlfi_eom(SMFICTX *ctx)
+ }
+ }
+
++ if (result == DMARC_RESULT_QUARANTINE)
++ {
++ snprintf(replybuf, sizeof replybuf,
++ "quarantined by DMARC policy for %s",
++ pdomain);
++
++ status = smfi_quarantine(ctx, replybuf);
++ if (status != MI_SUCCESS && conf->conf_dolog)
++ {
++ syslog(LOG_ERR, "%s: smfi_quarantine() failed",
++ dfc->mctx_jobid);
++ }
++ }
++
+ /*
+ ** Append arc override to historyfile. The format
+ **
diff --git a/arcares-segfaults.patch b/arcares-segfaults.patch
new file mode 100644
index 0000000..2fa9fc9
--- /dev/null
+++ b/arcares-segfaults.patch
@@ -0,0 +1,49 @@
+From: "@KIC-8462852" <>
+Date: Sat, 17 Jun 2023 11:48:36 +0100
+Subject: Fix segfaults in ARC-Authentication-Results headers
+
+Origin: other, https://github.com/trusteddomainproject/OpenDMARC/files/11602352/opendmarc-arcares.patch.txt
+Bug: https://github.com/trusteddomainproject/OpenDMARC/issues/242
+---
+ opendmarc/opendmarc-arcares.c | 12 +++++++++++-
+ 1 file changed, 11 insertions(+), 1 deletion(-)
+
+diff --git a/opendmarc/opendmarc-arcares.c b/opendmarc/opendmarc-arcares.c
+index 0beebda..f7a5c83 100644
+--- a/opendmarc/opendmarc-arcares.c
++++ b/opendmarc/opendmarc-arcares.c
+@@ -179,6 +179,9 @@ opendmarc_arcares_parse (u_char *hdr, struct arcares *aar)
+ if (*token_ptr == '\0')
+ return 0;
+ tag_label = strsep(&token_ptr, "=");
++ if (token_ptr == NULL)
++ return -1;
++
+ tag_value = token_ptr;
+ tag_code = opendmarc_arcares_convert(aar_tags, tag_label);
+
+@@ -201,8 +204,9 @@ opendmarc_arcares_parse (u_char *hdr, struct arcares *aar)
+ /* next value will be unlabeled authserv_id */
+ if ((token = strsep((char **) &tmp_ptr, ";")) != NULL)
+ {
+- leading_space_len = strspn(token, " \n\t");
+ tag_value = opendmarc_arcares_strip_whitespace(token);
++ if (tag_value == NULL)
++ return -1;
+ strlcpy(aar->authserv_id, tag_value, sizeof aar->authserv_id);
+ }
+ break;
+@@ -266,7 +270,13 @@ opendmarc_arcares_arc_parse (u_char *hdr_arc, struct arcares_arc_field *arc)
+ if (*token_ptr == '\0')
+ return 0;
+ tag_label = strsep(&token_ptr, "=");
++ if (token_ptr == NULL)
++ return -1;
++
+ tag_value = opendmarc_arcares_strip_whitespace(token_ptr);
++ if (tag_value == NULL)
++ return -1;
++
+ tag_code = opendmarc_arcares_convert(aar_arc_tags, tag_label);
+
+ switch (tag_code)
diff --git a/arcseal-segfaults.patch b/arcseal-segfaults.patch
new file mode 100644
index 0000000..a40817f
--- /dev/null
+++ b/arcseal-segfaults.patch
@@ -0,0 +1,50 @@
+From: "@KIC-8462852" <>
+Date: Tue, 18 Jan 2022 11:57:01 -0500
+Subject: Fix segfaults, increase token max lengths in ARC-Seal headers
+
+Origin: other, https://github.com/trusteddomainproject/OpenDMARC/files/6717466/opendmarc-arcseal.patch.txt
+Bug: https://github.com/trusteddomainproject/OpenDMARC/issues/183
+---
+ opendmarc/opendmarc-arcseal.c | 7 ++++++-
+ opendmarc/opendmarc-arcseal.h | 2 +-
+ 2 files changed, 7 insertions(+), 2 deletions(-)
+
+diff --git a/opendmarc/opendmarc-arcseal.c b/opendmarc/opendmarc-arcseal.c
+index 73eebb7..a5ae77b 100644
+--- a/opendmarc/opendmarc-arcseal.c
++++ b/opendmarc/opendmarc-arcseal.c
+@@ -29,7 +29,7 @@
+ #include "opendmarc.h"
+
+ #define OPENDMARC_ARCSEAL_MAX_FIELD_NAME_LEN 255
+-#define OPENDMARC_ARCSEAL_MAX_TOKEN_LEN 512
++#define OPENDMARC_ARCSEAL_MAX_TOKEN_LEN 768
+
+ /* tables */
+ struct opendmarc_arcseal_lookup
+@@ -167,7 +167,12 @@ opendmarc_arcseal_parse(u_char *hdr, struct arcseal *as)
+ if (*token_ptr == '\0')
+ return 0;
+ tag_label = strsep(&token_ptr, "=");
++ if (token_ptr == NULL)
++ return -1;
++
+ tag_value = opendmarc_arcseal_strip_whitespace(token_ptr);
++ if (tag_value == NULL)
++ return -1;
+
+ tag_code = opendmarc_arcseal_convert(as_tags, tag_label);
+
+diff --git a/opendmarc/opendmarc-arcseal.h b/opendmarc/opendmarc-arcseal.h
+index 4eb0927..6e11a06 100644
+--- a/opendmarc/opendmarc-arcseal.h
++++ b/opendmarc/opendmarc-arcseal.h
+@@ -32,7 +32,7 @@
+ /* max header tag value length (short) */
+ #define OPENDMARC_ARCSEAL_MAX_SHORT_VALUE_LEN 256
+ /* max header tag value length (long) */
+-#define OPENDMARC_ARCSEAL_MAX_LONG_VALUE_LEN 512
++#define OPENDMARC_ARCSEAL_MAX_LONG_VALUE_LEN 768
+
+ /* names and field labels */
+ #define OPENDMARC_ARCSEAL_HDRNAME "ARC-Seal"
diff --git a/check-correct-domain.patch b/check-correct-domain.patch
new file mode 100644
index 0000000..a78230c
--- /dev/null
+++ b/check-correct-domain.patch
@@ -0,0 +1,22 @@
+From: Maximilian Eschenbacher <maximilian at eschenbacher.email>
+Date: Thu, 16 Mar 2023 11:17:39 +0100
+Subject: opendmarc-check: print correct domain in loop
+
+Bug: https://github.com/trusteddomainproject/OpenDMARC/pull/209
+---
+ opendmarc/opendmarc-check.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/opendmarc/opendmarc-check.c b/opendmarc/opendmarc-check.c
+index c569cd4..48f0fc3 100644
+--- a/opendmarc/opendmarc-check.c
++++ b/opendmarc/opendmarc-check.c
+@@ -223,7 +223,7 @@ main(int argc, char **argv)
+ rua = opendmarc_policy_fetch_rua(dmarc, NULL, 0, 1);
+ ruf = opendmarc_policy_fetch_ruf(dmarc, NULL, 0, 1);
+
+- fprintf(stdout, "DMARC record for %s:\n", argv[1]);
++ fprintf(stdout, "DMARC record for %s:\n", argv[c]);
+ fprintf(stdout, "\tSample percentage: %d\n", pct);
+ fprintf(stdout, "\tDKIM alignment: %s\n", adkim);
+ fprintf(stdout, "\tSPF alignment: %s\n", aspf);
diff --git a/check_domain.patch b/check_domain.patch
new file mode 100644
index 0000000..7824458
--- /dev/null
+++ b/check_domain.patch
@@ -0,0 +1,22 @@
+From: =?utf-8?q?David_B=C3=BCrgin?= <dbuergin at gluet.ch>
+Date: Tue, 18 Jan 2022 11:57:01 -0500
+Subject: Make function check_domain static
+
+Bug: https://github.com/trusteddomainproject/OpenDMARC/pull/177
+---
+ libopendmarc/opendmarc_policy.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/libopendmarc/opendmarc_policy.c b/libopendmarc/opendmarc_policy.c
+index 32053db..c864906 100644
+--- a/libopendmarc/opendmarc_policy.c
++++ b/libopendmarc/opendmarc_policy.c
+@@ -35,7 +35,7 @@
+ ** TRUE if the syntax was fine, FALSE otherwise.
+ */
+
+-bool check_domain(u_char *domain)
++static bool check_domain(u_char *domain)
+ {
+ u_char *dp;
+
diff --git a/cleanup-buflen.patch b/cleanup-buflen.patch
new file mode 100644
index 0000000..373dcbe
--- /dev/null
+++ b/cleanup-buflen.patch
@@ -0,0 +1,22 @@
+From: devgs <devgs at ukr.net>
+Date: Tue, 18 Jan 2022 11:57:01 -0500
+Subject: Fix off-by-one error buffer overrun in opendmarc_util_cleanup
+
+Bug: https://github.com/trusteddomainproject/OpenDMARC/pull/188
+---
+ libopendmarc/opendmarc_util.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/libopendmarc/opendmarc_util.c b/libopendmarc/opendmarc_util.c
+index 4ab8ac0..86cc69b 100644
+--- a/libopendmarc/opendmarc_util.c
++++ b/libopendmarc/opendmarc_util.c
+@@ -160,7 +160,7 @@ opendmarc_util_cleanup(u_char *str, u_char *buf, size_t buflen)
+ {
+ char *sp, *ep;
+
+- if (str == NULL || buf == NULL || strlen((char *)str) > buflen)
++ if (str == NULL || buf == NULL || strlen((char *)str) >= buflen)
+ {
+ errno = EINVAL;
+ return NULL;
diff --git a/conf_refcnt.patch b/conf_refcnt.patch
new file mode 100644
index 0000000..8b59a5b
--- /dev/null
+++ b/conf_refcnt.patch
@@ -0,0 +1,22 @@
+From: =?utf-8?b?0JTQuNC70Y/QvSDQn9Cw0LvQsNGD0LfQvtCy?= <git-dpa at aegee.org>
+Date: Tue, 18 Jan 2022 11:57:01 -0500
+Subject: opendmarc/opendmarc.c:dmarfc_config_free: don't assert
+ conf->conf_refcnt == 0
+
+Bug: https://github.com/trusteddomainproject/OpenDMARC/issues/18
+---
+ opendmarc/opendmarc.c | 1 -
+ 1 file changed, 1 deletion(-)
+
+diff --git a/opendmarc/opendmarc.c b/opendmarc/opendmarc.c
+index fbb6e40..fbf06b6 100644
+--- a/opendmarc/opendmarc.c
++++ b/opendmarc/opendmarc.c
+@@ -4225,7 +4225,6 @@ static void
+ dmarcf_config_free(struct dmarcf_config *conf)
+ {
+ assert(conf != NULL);
+- assert(conf->conf_refcnt == 0);
+
+ if (conf->conf_data != NULL)
+ config_free(conf->conf_data);
diff --git a/cve-2024-25768.patch b/cve-2024-25768.patch
new file mode 100644
index 0000000..3996384
--- /dev/null
+++ b/cve-2024-25768.patch
@@ -0,0 +1,22 @@
+From: =?utf-8?q?David_B=C3=BCrgin?= <dbuergin at gluet.ch>
+Date: Thu, 23 May 2024 17:35:20 +0200
+Subject: Fix null pointer dereference in opendmarc_policy.c (CVE-2024-25768)
+
+Bug: https://github.com/trusteddomainproject/OpenDMARC/issues/256
+---
+ libopendmarc/opendmarc_policy.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/libopendmarc/opendmarc_policy.c b/libopendmarc/opendmarc_policy.c
+index c864906..35b23c1 100644
+--- a/libopendmarc/opendmarc_policy.c
++++ b/libopendmarc/opendmarc_policy.c
+@@ -1475,7 +1475,7 @@ opendmarc_policy_fetch_ruf(DMARC_POLICY_T *pctx, u_char *list_buf, size_t size_o
+ {
+ return NULL;
+ }
+- if (list_buf != NULL || size_of_buf > 0)
++ if (list_buf != NULL && size_of_buf > 0)
+ {
+ (void) memset(list_buf, '\0', size_of_buf);
+ sp = list_buf;
diff --git a/free-arcdomain.patch b/free-arcdomain.patch
new file mode 100644
index 0000000..af96676
--- /dev/null
+++ b/free-arcdomain.patch
@@ -0,0 +1,25 @@
+From: "@KIC-8462852" <>
+Date: Tue, 18 Jan 2022 11:57:01 -0500
+Subject: Fix memory leak when evaluating ARC chain by freeing temporary
+ string "arcdomain"
+
+Origin: other, https://github.com/trusteddomainproject/OpenDMARC/files/6682308/opendmarc-free-arcdomain-patch.txt
+Bug: https://github.com/trusteddomainproject/OpenDMARC/issues/182
+---
+ opendmarc/opendmarc.c | 3 +++
+ 1 file changed, 3 insertions(+)
+
+diff --git a/opendmarc/opendmarc.c b/opendmarc/opendmarc.c
+index fbf06b6..be3d496 100644
+--- a/opendmarc/opendmarc.c
++++ b/opendmarc/opendmarc.c
+@@ -3009,6 +3009,9 @@ mlfi_eom(SMFICTX *ctx)
+ eptr = hsearch(entry,
+ FIND);
+ pthread_rwlock_unlock(&hash_lock);
++
++ free(arcdomain);
++
+ if (eptr == NULL)
+ continue;
+
diff --git a/insheader.patch b/insheader.patch
new file mode 100644
index 0000000..b0ba383
--- /dev/null
+++ b/insheader.patch
@@ -0,0 +1,49 @@
+From: =?utf-8?q?David_B=C3=BCrgin?= <dbuergin at gluet.ch>
+Date: Tue, 18 Jan 2022 11:57:01 -0500
+Subject: Insert trace headers at index 0
+
+Bug: https://github.com/trusteddomainproject/OpenDMARC/pull/171
+---
+ opendmarc/opendmarc.c | 8 ++++----
+ 1 file changed, 4 insertions(+), 4 deletions(-)
+
+diff --git a/opendmarc/opendmarc.c b/opendmarc/opendmarc.c
+index 5b09c3f..fbb6e40 100644
+--- a/opendmarc/opendmarc.c
++++ b/opendmarc/opendmarc.c
+@@ -3177,7 +3177,7 @@ mlfi_eom(SMFICTX *ctx)
+ authservid, pass_fail, use_domain);
+ }
+
+- if (dmarcf_insheader(ctx, 1, AUTHRESULTSHDR,
++ if (dmarcf_insheader(ctx, 0, AUTHRESULTSHDR,
+ header) == MI_FAILURE)
+ {
+ if (conf->conf_dolog)
+@@ -3242,7 +3242,7 @@ mlfi_eom(SMFICTX *ctx)
+ "%s; dmarc=permerror header.from=%s",
+ authservid, dfc->mctx_fromdomain);
+
+- if (dmarcf_insheader(ctx, 1, AUTHRESULTSHDR,
++ if (dmarcf_insheader(ctx, 0, AUTHRESULTSHDR,
+ header) == MI_FAILURE)
+ {
+ if (conf->conf_dolog)
+@@ -3791,7 +3791,7 @@ mlfi_eom(SMFICTX *ctx)
+ conf->conf_authservidwithjobid ? dfc->mctx_jobid : "",
+ aresult, apolicy, adisposition, dfc->mctx_fromdomain);
+
+- if (dmarcf_insheader(ctx, 1, AUTHRESULTSHDR,
++ if (dmarcf_insheader(ctx, 0, AUTHRESULTSHDR,
+ header) == MI_FAILURE)
+ {
+ if (conf->conf_dolog)
+@@ -3910,7 +3910,7 @@ mlfi_eom(SMFICTX *ctx)
+ dfc->mctx_jobid != NULL ? dfc->mctx_jobid
+ : JOBIDUNKNOWN);
+
+- if (dmarcf_insheader(ctx, 1, SWHEADERNAME,
++ if (dmarcf_insheader(ctx, 0, SWHEADERNAME,
+ header) == MI_FAILURE)
+ {
+ if (conf->conf_dolog)
diff --git a/opendmarc-1.4.0-remove-docs-configure.patch b/opendmarc-1.4.0-remove-docs-configure.patch
new file mode 100644
index 0000000..fd0d898
--- /dev/null
+++ b/opendmarc-1.4.0-remove-docs-configure.patch
@@ -0,0 +1,27 @@
+diff --color -Nur OpenDMARC-rel-opendmarc-1-4-0.orig/configure.ac OpenDMARC-rel-opendmarc-1-4-0/configure.ac
+--- OpenDMARC-rel-opendmarc-1-4-0.orig/configure.ac 2021-01-28 09:35:29.000000000 -0800
++++ OpenDMARC-rel-opendmarc-1-4-0/configure.ac 2021-04-24 21:18:14.467833053 -0700
+@@ -139,15 +139,9 @@
+ AC_SEARCH_LIBS(res_ninit, resolv,
+ AC_DEFINE(HAVE_RES_NINIT, 1,
+ [Define to 1 if you have the `res_ninit()' function.]))
+-AC_SEARCH_LIBS(res_ndestroy, resolv,
+- AC_DEFINE(HAVE_RES_NDESTROY, 1,
+- [Define to 1 if you have the `res_ndestroy()' function.]))
+ AC_SEARCH_LIBS(__res_ninit, resolv,
+ AC_DEFINE(HAVE_RES_NINIT, 1,
+ [Define to 1 if you have the `__res_ninit()' function.]))
+-AC_SEARCH_LIBS(__res_ndestroy, resolv,
+- AC_DEFINE(HAVE_RES_NDESTROY, 1,
+- [Define to 1 if you have the `__res_ndestroy()' function.]))
+
+ m4_rename_force([saved_AC_LANG_CALL], [AC_LANG_CALL])
+ AC_CHECK_LIB(idn, idn_free)
+@@ -513,7 +507,6 @@
+ contrib/spec/Makefile
+ contrib/spec/opendmarc.spec
+ db/Makefile
+- docs/Makefile
+ libopendmarc/Makefile
+ libopendmarc/tests/Makefile
+ libopendmarc/tests/testfiles/Makefile
diff --git a/parse-arc-leaks.patch b/parse-arc-leaks.patch
new file mode 100644
index 0000000..39edb2d
--- /dev/null
+++ b/parse-arc-leaks.patch
@@ -0,0 +1,35 @@
+From: "@KIC-8462852" <>
+Date: Sat, 17 Jun 2023 11:48:36 +0100
+Subject: Fix memory leaks when parsing ARC headers
+
+Origin: other, https://github.com/trusteddomainproject/OpenDMARC/files/11602321/opendmarc.patch.txt
+Bug: https://github.com/trusteddomainproject/OpenDMARC/issues/241
+---
+ opendmarc/opendmarc.c | 6 ++++++
+ 1 file changed, 6 insertions(+)
+
+diff --git a/opendmarc/opendmarc.c b/opendmarc/opendmarc.c
+index 9317817..e53953e 100644
+--- a/opendmarc/opendmarc.c
++++ b/opendmarc/opendmarc.c
+@@ -2614,6 +2614,8 @@ mlfi_eom(SMFICTX *ctx)
+ /* parse it */
+ if (opendmarc_arcares_parse(hdr->hdr_value, &aar_hdr_new->arcares) != 0)
+ {
++ free(aar_hdr_new);
++ aar_hdr_new = NULL;
+ syslog(LOG_WARNING,
+ "%s: ignoring invalid %s header \"%s\"",
+ dfc->mctx_jobid, hdr->hdr_name, hdr->hdr_value);
+@@ -2660,7 +2662,11 @@ mlfi_eom(SMFICTX *ctx)
+
+ /* parse it */
+ if (opendmarc_arcseal_parse(hdr->hdr_value, &as_hdr_new->arcseal) != 0)
++ {
++ free(as_hdr_new);
++ as_hdr_new = NULL;
+ continue;
++ }
+
+ if (dfc->mctx_ashead == NULL)
+ {
diff --git a/ticket168.patch b/ticket168.patch
new file mode 100644
index 0000000..e4136eb
--- /dev/null
+++ b/ticket168.patch
@@ -0,0 +1,141 @@
+From: Scott Kitterman <scott at kitterman.com>
+Date: Mon, 23 Dec 2019 11:12:36 -0500
+Subject: allow one to configure the SMTP Reject reason. This patch adds the
+ RejectString option.
+
+Bug: https://sourceforge.net/p/opendmarc/tickets/168/
+---
+ opendmarc/opendmarc-config.h | 1 +
+ opendmarc/opendmarc.c | 34 +++++++++++++++++++++++++++++++++-
+ opendmarc/opendmarc.conf.5.in | 7 +++++++
+ opendmarc/opendmarc.conf.sample | 8 ++++++++
+ opendmarc/opendmarc.h | 1 +
+ 5 files changed, 50 insertions(+), 1 deletion(-)
+
+diff --git a/opendmarc/opendmarc-config.h b/opendmarc/opendmarc-config.h
+index 1b781df..8398007 100644
+--- a/opendmarc/opendmarc-config.h
++++ b/opendmarc/opendmarc-config.h
+@@ -47,6 +47,7 @@ struct configdef dmarcf_config[] =
+ { "RequiredHeaders", CONFIG_TYPE_BOOLEAN, FALSE },
+ { "RejectFailures", CONFIG_TYPE_BOOLEAN, FALSE },
+ { "RejectMultiValueFrom", CONFIG_TYPE_BOOLEAN, FALSE },
++ { "RejectString", CONFIG_TYPE_STRING, FALSE },
+ { "ReportCommand", CONFIG_TYPE_STRING, FALSE },
+ { "Socket", CONFIG_TYPE_STRING, FALSE },
+ { "SoftwareHeader", CONFIG_TYPE_BOOLEAN, FALSE },
+diff --git a/opendmarc/opendmarc.c b/opendmarc/opendmarc.c
+index aee0d48..687ef6d 100644
+--- a/opendmarc/opendmarc.c
++++ b/opendmarc/opendmarc.c
+@@ -190,6 +190,7 @@ struct dmarcf_config
+ char * conf_historyfile;
+ char * conf_pslist;
+ char * conf_ignorelist;
++ char * conf_rejectstring;
+ char ** conf_trustedauthservids;
+ char ** conf_ignoredomains;
+ struct list * conf_domainwhitelist;
+@@ -1419,6 +1420,10 @@ dmarcf_config_load(struct config *data, struct dmarcf_config *conf,
+ &conf->conf_rejectfail,
+ sizeof conf->conf_rejectfail);
+
++ (void) config_get(data, "RejectString",
++ &conf->conf_rejectstring,
++ sizeof conf->conf_rejectstring);
++
+ (void) config_get(data, "RequiredHeaders",
+ &conf->conf_reqhdrs,
+ sizeof conf->conf_reqhdrs);
+@@ -1627,6 +1632,33 @@ dmarcf_config_load(struct config *data, struct dmarcf_config *conf,
+
+ pthread_rwlock_unlock(&hash_lock);
+
++ if ( conf->conf_rejectstring == NULL ) {
++ conf->conf_rejectstring = DEFREJECTSTR;
++ }
++ else {
++ /* Count occurrences of "%s" in RejectString */
++ int countocc = 0;
++ const char *tmp = conf->conf_rejectstring;
++ while(tmp = strstr(tmp, "%s"))
++ {
++ countocc++;
++ tmp++;
++ }
++ switch ( countocc ) {
++ case 0:
++ snprintf(err, errlen, "%s: The RejectString doesn't contain %%s!",
++ basedir);
++ return -1;
++ case 1:
++ break;
++ default:
++ snprintf(err, errlen, "%s: The RejectString contains %d occurrences of %%s instead of one!",
++ basedir, countocc);
++ return -1;
++ }
++ }
++
++
+ return 0;
+ }
+
+@@ -3561,7 +3593,7 @@ mlfi_eom(SMFICTX *ctx)
+ random() % 100 < pct)
+ {
+ snprintf(replybuf, sizeof replybuf,
+- "rejected by DMARC policy for %s", pdomain);
++ conf->conf_rejectstring, pdomain);
+
+ status = dmarcf_setreply(ctx, DMARC_REJECT_SMTP,
+ DMARC_REJECT_ESC, replybuf);
+diff --git a/opendmarc/opendmarc.conf.5.in b/opendmarc/opendmarc.conf.5.in
+index f7cea9a..ced6ddb 100644
+--- a/opendmarc/opendmarc.conf.5.in
++++ b/opendmarc/opendmarc.conf.5.in
+@@ -272,6 +272,13 @@ If set, messages with multiple addresses in the From: field of the message
+ will be rejected unless all domain names in that field are the same. They
+ will otherwise be ignored by the filter (the default).
+
++.TP
++.I RejectString (string)
++This string describes the reason of reject at SMTP level.
++The message MUST contain the word "%s" once, which will be replaced by
++the RFC5322.From domain.
++The default is "rejected by DMARC policy for %s"
++
+ .TP
+ .I ReportCommand (string)
+ Indicates the shell command to which failure reports should be passed for
+diff --git a/opendmarc/opendmarc.conf.sample b/opendmarc/opendmarc.conf.sample
+index 69c9afb..2accc6f 100644
+--- a/opendmarc/opendmarc.conf.sample
++++ b/opendmarc/opendmarc.conf.sample
+@@ -325,6 +325,14 @@
+ #
+ # RejectMultiValueFrom false
+
++## RejectString string
++## default ("rejected by DMARC policy for %s")
++##
++## This string describes the reason of reject. The message MUST contain the
++## word "%s" (only once), which will be replaced by the RFC5322.From domain.
++#
++# RejectString rejected by DMARC policy for %s
++
+ ## ReportCommand string
+ ## default "/usr/sbin/sendmail -t"
+ ##
+diff --git a/opendmarc/opendmarc.h b/opendmarc/opendmarc.h
+index e36f93a..a3b053e 100644
+--- a/opendmarc/opendmarc.h
++++ b/opendmarc/opendmarc.h
+@@ -34,6 +34,7 @@
+ #define BUFRSZ 2048
+ #define DEFCONFFILE CONFIG_BASE "/opendmarc.conf"
+ #define DEFREPORTCMD "/usr/sbin/sendmail -t -odq"
++#define DEFREJECTSTR "rejected by DMARC policy for %s"
+ #define JOBIDUNKNOWN "(unknown-jobid)"
+ #define MAXARGV 65536
+ #define MAXHEADER 1024
diff --git a/ticket193.patch b/ticket193.patch
new file mode 100644
index 0000000..3400964
--- /dev/null
+++ b/ticket193.patch
@@ -0,0 +1,108 @@
+From: Scott Kitterman <scott at kitterman.com>
+Date: Mon, 23 Dec 2019 11:12:36 -0500
+Subject: ticket193
+
+Bug: https://sourceforge.net/p/opendmarc/tickets/193/
+---
+ db/Makefile.am | 2 +-
+ db/README.update-db-schema.mysql | 8 ++++++++
+ db/schema.mysql | 3 ++-
+ db/update-db-schema.mysql | 12 ++++++++++++
+ reports/opendmarc-expire.in | 13 ++++++++++++-
+ 5 files changed, 35 insertions(+), 3 deletions(-)
+ create mode 100644 db/README.update-db-schema.mysql
+ create mode 100644 db/update-db-schema.mysql
+
+diff --git a/db/Makefile.am b/db/Makefile.am
+index 43b8614..83bc1d1 100644
+--- a/db/Makefile.am
++++ b/db/Makefile.am
+@@ -1,3 +1,3 @@
+ # Copyright (c) 2012, The Trusted Domain Project. All rights reserved.
+
+-dist_doc_DATA = README.schema schema.mysql
++dist_doc_DATA = README.schema schema.mysql README.update-db-schema.mysql update-db-schema.mysql
+diff --git a/db/README.update-db-schema.mysql b/db/README.update-db-schema.mysql
+new file mode 100644
+index 0000000..8a6a909
+--- /dev/null
++++ b/db/README.update-db-schema.mysql
+@@ -0,0 +1,8 @@
++
++To update your database to the current state use this script like this:
++
++ mysql -u <user> -p <passwd> --force < update-db-schema.mysql
++
++You might receive up to four errors about duplicate keys - this is expected if your database
++already has these keys (because you used the MySQL schema in the db sub-direcory instead of
++the obsolete schema in the reports sub-dirctory).
+diff --git a/db/schema.mysql b/db/schema.mysql
+index 059c3de..926d141 100644
+--- a/db/schema.mysql
++++ b/db/schema.mysql
+@@ -5,6 +5,7 @@
+
+ CREATE DATABASE IF NOT EXISTS opendmarc;
+ USE opendmarc;
++SET TIME_ZONE='+00:00';
+
+ -- A table for mapping domain names and their DMARC policies to IDs
+ CREATE TABLE IF NOT EXISTS domains (
+@@ -66,7 +67,7 @@ CREATE TABLE IF NOT EXISTS requests (
+ pct TINYINT NOT NULL DEFAULT '0',
+ locked TINYINT NOT NULL DEFAULT '0',
+ firstseen TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,
+- lastsent TIMESTAMP NOT NULL DEFAULT '1970-01-01 00:00:00',
++ lastsent TIMESTAMP NOT NULL DEFAULT '1970-01-01 00:00:01',
+
+ PRIMARY KEY(id),
+ KEY(lastsent),
+diff --git a/db/update-db-schema.mysql b/db/update-db-schema.mysql
+new file mode 100644
+index 0000000..5c0a190
+--- /dev/null
++++ b/db/update-db-schema.mysql
+@@ -0,0 +1,12 @@
++use opendmarc;
++SET TIME_ZONE="+00:00";
++ALTER TABLE ipaddr MODIFY COLUMN addr VARCHAR(64) NOT NULL;
++DELETE FROM ipaddr WHERE addr = NULL;
++ALTER TABLE messages MODIFY COLUMN spf TINYINT NOT NULL;
++ALTER TABLE requests ALTER COLUMN locked SET DEFAULT '0';
++ALTER TABLE requests ALTER COLUMN lastsent SET DEFAULT '1970-01-01 00:00:01';
++ALTER TABLE requests ADD UNIQUE KEY domain (domain);
++ALTER TABLE requests ADD KEY lastsent (lastsent);
++ALTER TABLE messages ADD KEY date (date);
++ALTER TABLE signatures ADD KEY message (message);
++
+diff --git a/reports/opendmarc-expire.in b/reports/opendmarc-expire.in
+index 326a5a3..0115429 100755
+--- a/reports/opendmarc-expire.in
++++ b/reports/opendmarc-expire.in
+@@ -210,6 +210,17 @@ if ($verbose)
+ print STDERR "$progname: connected to database\n";
+ }
+
++# switch to UTC to have a defined date behaviour
++$dbi_s = $dbi_h->prepare("SET TIME_ZONE='+00:00'");
++
++if (!$dbi_s->execute())
++{
++ print STDERR "$progname: failed to change to UTC: " . $dbi_h->errstr . "\n";
++ $dbi_s->finish;
++ $dbi_h->disconnect;
++ exit(1);
++}
++
+ #
+ # Expire messages
+ #
+@@ -414,7 +425,7 @@ if ($verbose)
+ print STDERR "$progname: expiring request data older than $maxage days\n";
+ }
+
+-$dbi_s = $dbi_h->prepare("DELETE FROM requests WHERE lastsent <= DATE_SUB(CURRENT_TIMESTAMP(), INTERVAL ? DAY) AND NOT lastsent = '0000-00-00 00:00:00'");
++$dbi_s = $dbi_h->prepare("DELETE FROM requests WHERE lastsent <= DATE_SUB(CURRENT_TIMESTAMP(), INTERVAL ? DAY) AND NOT lastsent <= '1970-01-01 00:00:01'");
+ $rows = $dbi_s->execute($maxage);
+ if (!$rows)
+ {
diff --git a/ticket204.patch b/ticket204.patch
new file mode 100644
index 0000000..435149c
--- /dev/null
+++ b/ticket204.patch
@@ -0,0 +1,40 @@
+From: Scott Kitterman <scott at kitterman.com>
+Date: Mon, 23 Dec 2019 11:12:36 -0500
+Subject: ticket204
+
+Bug: https://sourceforge.net/p/opendmarc/tickets/204/
+---
+ reports/opendmarc-import.in | 6 +++---
+ 1 file changed, 3 insertions(+), 3 deletions(-)
+
+diff --git a/reports/opendmarc-import.in b/reports/opendmarc-import.in
+index 3a2f404..0169c9e 100755
+--- a/reports/opendmarc-import.in
++++ b/reports/opendmarc-import.in
+@@ -649,7 +649,7 @@ while (<$inputfh>)
+ }
+
+ case "from" {
+- $fdomain = $value;
++ $fdomain = lc($value);
+ }
+
+ case "job" {
+@@ -691,7 +691,7 @@ while (<$inputfh>)
+ }
+
+ case "mfrom" {
+- $envdomain = $value;
++ $envdomain = lc($value);
+ }
+
+ case "p" {
+@@ -703,7 +703,7 @@ while (<$inputfh>)
+ }
+
+ case "pdomain" {
+- $pdomain = $value;
++ $pdomain = lc($value);
+ }
+
+ case "policy" {
diff --git a/ticket207.patch b/ticket207.patch
new file mode 100644
index 0000000..14154e0
--- /dev/null
+++ b/ticket207.patch
@@ -0,0 +1,49 @@
+From: Scott Kitterman <scott at kitterman.com>
+Date: Mon, 23 Dec 2019 11:12:36 -0500
+Subject: ticket207
+
+Bug: https://sourceforge.net/p/opendmarc/tickets/207/
+---
+ reports/opendmarc-reports.in | 8 +++++++-
+ 1 file changed, 7 insertions(+), 1 deletion(-)
+
+diff --git a/reports/opendmarc-reports.in b/reports/opendmarc-reports.in
+index 69a2194..143997e 100755
+--- a/reports/opendmarc-reports.in
++++ b/reports/opendmarc-reports.in
+@@ -65,6 +65,7 @@ my $domainset;
+ my $forcedomain;
+ my @skipdomains;
+
++my $poldomain;
+ my $policy;
+ my $spolicy;
+ my $policystr;
+@@ -447,7 +448,7 @@ foreach (@$domainset)
+ next;
+ }
+
+- $dbi_s = $dbi_h->prepare("SELECT repuri, adkim, aspf, policy, spolicy, pct, UNIX_TIMESTAMP(lastsent) FROM requests WHERE domain = ?");
++ $dbi_s = $dbi_h->prepare("SELECT repuri, adkim, aspf, requests.policy, spolicy, pct, UNIX_TIMESTAMP(lastsent), domains.name FROM requests JOIN messages ON messages.from_domain=requests.domain LEFT JOIN domains ON messages.policy_domain = domains.id WHERE domain = ? GROUP BY policy_domain");
+ if (!$dbi_s->execute($domainid))
+ {
+ print STDERR "$progname: can't get reporting URI for domain $domain: " . $dbi_h->errstr . "\n";
+@@ -457,6 +458,7 @@ foreach (@$domainset)
+ }
+
+ undef $repuri;
++ $poldomain=$domain;
+
+ while ($dbi_a = $dbi_s->fetchrow_arrayref())
+ {
+@@ -488,6 +490,10 @@ foreach (@$domainset)
+ {
+ $lastsent = $dbi_a->[6];
+ }
++ if (defined($dbi_a->[7]))
++ {
++ $poldomain = $dbi_a->[7];
++ }
+ }
+
+ $dbi_s->finish;
diff --git a/ticket208.patch b/ticket208.patch
new file mode 100644
index 0000000..cb7ef50
--- /dev/null
+++ b/ticket208.patch
@@ -0,0 +1,131 @@
+From: Scott Kitterman <scott at kitterman.com>
+Date: Mon, 23 Dec 2019 11:12:36 -0500
+Subject: ticket208
+
+Bug: https://sourceforge.net/p/opendmarc/tickets/208/
+---
+ opendmarc/opendmarc-config.h | 1 +
+ opendmarc/opendmarc.c | 36 +++++++++++++++++++++++++++++++++++-
+ opendmarc/opendmarc.conf.5.in | 7 +++++++
+ opendmarc/opendmarc.conf.sample | 10 ++++++++++
+ 4 files changed, 53 insertions(+), 1 deletion(-)
+
+diff --git a/opendmarc/opendmarc-config.h b/opendmarc/opendmarc-config.h
+index 8398007..84cdcc5 100644
+--- a/opendmarc/opendmarc-config.h
++++ b/opendmarc/opendmarc-config.h
+@@ -40,6 +40,7 @@ struct configdef dmarcf_config[] =
+ { "IgnoreAuthenticatedClients", CONFIG_TYPE_BOOLEAN, FALSE },
+ { "IgnoreHosts", CONFIG_TYPE_STRING, FALSE },
+ { "IgnoreMailFrom", CONFIG_TYPE_STRING, FALSE },
++ { "IgnoreMailTo", CONFIG_TYPE_STRING, FALSE },
+ { "MilterDebug", CONFIG_TYPE_INTEGER, FALSE },
+ { "PidFile", CONFIG_TYPE_STRING, FALSE },
+ { "PublicSuffixList", CONFIG_TYPE_STRING, FALSE },
+diff --git a/opendmarc/opendmarc.c b/opendmarc/opendmarc.c
+index 687ef6d..5b09c3f 100644
+--- a/opendmarc/opendmarc.c
++++ b/opendmarc/opendmarc.c
+@@ -195,6 +195,7 @@ struct dmarcf_config
+ char ** conf_ignoredomains;
+ struct list * conf_domainwhitelist;
+ unsigned int conf_domainwhitelisthashcount;
++ char ** conf_ignorereceivers;
+ };
+
+ /* LIST -- basic linked list of strings */
+@@ -1381,6 +1382,11 @@ dmarcf_config_load(struct config *data, struct dmarcf_config *conf,
+ if (str != NULL)
+ dmarcf_mkarray(str, ",", &conf->conf_ignoredomains);
+
++ str = NULL;
++ (void) config_get(data, "IgnoreMailTo", &str, sizeof str);
++ if (str != NULL)
++ dmarcf_mkarray(str, ",", &conf->conf_ignorereceivers);
++
+ (void) config_get(data, "AuthservIDWithJobID",
+ &conf->conf_authservidwithjobid,
+ sizeof conf->conf_authservidwithjobid);
+@@ -2339,6 +2345,7 @@ sfsistat
+ mlfi_eom(SMFICTX *ctx)
+ {
+ _Bool wspf = FALSE;
++ int skiphistory;
+ int c;
+ int pc;
+ int policy;
+@@ -3803,7 +3810,34 @@ mlfi_eom(SMFICTX *ctx)
+ ** Record activity in the history file.
+ */
+
+- if (conf->conf_historyfile != NULL &&
++ skiphistory = 0;
++ if (conf->conf_ignorereceivers != NULL)
++ {
++ struct dmarcf_header *to = dmarcf_findheader(dfc, "To", 0);
++ if (to != NULL)
++ {
++ char *val = to->hdr_value;
++ while (*val && !skiphistory)
++ {
++ memset(addrbuf, '\0', sizeof addrbuf);
++ strncpy(addrbuf, val, sizeof addrbuf - 1);
++ status = dmarcf_mail_parse(addrbuf, &user, &domain);
++ if (status == 0 && user != NULL && domain != NULL)
++ {
++ snprintf(replybuf, sizeof replybuf - 1, "%s@%s", user, domain);
++ if(dmarcf_match(replybuf, conf->conf_ignorereceivers, TRUE))
++ {
++ skiphistory = 1;
++ }
++ }
++ while(*val && *val != ',' && *val != ';')
++ ++val;
++ if(*val)
++ ++val;
++ }
++ }
++ }
++ if (!skiphistory && conf->conf_historyfile != NULL &&
+ (conf->conf_recordall || ostatus != DMARC_DNS_ERROR_NO_RECORD))
+ {
+ FILE *f;
+diff --git a/opendmarc/opendmarc.conf.5.in b/opendmarc/opendmarc.conf.5.in
+index ced6ddb..dcb518c 100644
+--- a/opendmarc/opendmarc.conf.5.in
++++ b/opendmarc/opendmarc.conf.5.in
+@@ -231,6 +231,13 @@ be ignored by the filter. The list should be comma-separated. Matching
+ against this list is case-insensitive. The default is an empty list, meaning
+ no mail is ignored.
+
++.TP
++.I IgnoreMailTo (string)
++Gives a list of mail addresses which aren't entered into the history file.
++This is useful to prevent exchanging mutual message reports. The
++list should be comma-separated. Matching against this list is
++case-insensitive. The default is an empty list, meaning no mail is ignored.
++
+ .TP
+ .I MilterDebug (integer)
+ Sets the debug level to be requested from the milter library. The
+diff --git a/opendmarc/opendmarc.conf.sample b/opendmarc/opendmarc.conf.sample
+index 2accc6f..4e1f1ab 100644
+--- a/opendmarc/opendmarc.conf.sample
++++ b/opendmarc/opendmarc.conf.sample
+@@ -268,6 +268,16 @@
+ #
+ # IgnoreMailFrom example.com
+
++## IgnoreMailTo email[,...]
++## default (none)
++##
++## Gives a list of mail addresses which aren't entered into the history file.
++## This is useful to prevent exchanging mutual message reports. The
++## list should be comma-separated. Matching against this list is
++## case-insensitive. The default is an empty list, meaning no mail is ignored.
++#
++# IgnoreMailTo dmarc-ruf at example.com
++
+ ## MilterDebug (integer)
+ ## default 0
+ ##
diff --git a/ticket212.patch b/ticket212.patch
new file mode 100644
index 0000000..3cba64e
--- /dev/null
+++ b/ticket212.patch
@@ -0,0 +1,27 @@
+From: Scott Kitterman <scott at kitterman.com>
+Date: Mon, 23 Dec 2019 11:12:36 -0500
+Subject: ticket212
+
+Bug: https://sourceforge.net/p/opendmarc/tickets/212/
+---
+ libopendmarc/opendmarc_tld.c | 7 +++++--
+ 1 file changed, 5 insertions(+), 2 deletions(-)
+
+diff --git a/libopendmarc/opendmarc_tld.c b/libopendmarc/opendmarc_tld.c
+index 6dd889d..fa2de26 100644
+--- a/libopendmarc/opendmarc_tld.c
++++ b/libopendmarc/opendmarc_tld.c
+@@ -134,8 +134,11 @@ opendmarc_tld_read_file(char *path_fname, char *commentstring, char *drop, char
+ return (errno == 0) ? ENOMEM : errno;
+
+ fp = fopen(path_fname, "r");
+- if (fp == NULL)
+- return errno;
++ if (fp == NULL) {
++ ret = errno;
++ opendmarc_hash_shutdown(hashp);
++ return ret;
++ }
+
+ errno = 0;
+ while (fgets((char *)buf, sizeof buf, fp) != NULL)
================================================================
---- gitweb:
http://git.pld-linux.org/gitweb.cgi/packages/opendmarc.git/commitdiff/51a5a3bf0dc4f50815fa663565787a3ee1c365f3
More information about the pld-cvs-commit
mailing list