[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#992858: RFS: opendkim/2.11.0~beta2-5 -- DomainKeys Identified Mail (DKIM) signing and verifying milter



Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "opendkim":

 * Package name    : opendkim
   Version         : 2.11.0~beta2-5
   Upstream Author : The Trusted Domain Project
 * URL             : http://www.opendkim.org/
 * License         : ISC, BSD-3-clause and SOSL, GPL-3+ with AutoConf exception
 * Vcs             : https://salsa.debian.org/debian/opendkim
   Section         : mail

It builds those binary packages:

  miltertest - utility for testing milter applications
  librbl-dev - Real-time Blacklist (RBL) query library (development files)
  librbl1 - Real-time Blacklist (RBL) query library
  libvbr-dev - Vouch By Reference (VBR) library (development files)
  libvbr2 - Vouch By Reference (VBR) library
  libopendkim-dev - DomainKeys Identified Mail (DKIM) library (development files)
  libopendkim11 - DomainKeys Identified Mail (DKIM) library
  opendkim-tools - utilities for administering the OpenDKIM milter
  opendkim - DomainKeys Identified Mail (DKIM) signing and verifying milter

To access further information about this package, please visit the following URL:

  https://mentors.debian.net/package/opendkim/

Alternatively, one can download the package with dget using this command:

  dget -x https://mentors.debian.net/debian/pool/main/o/opendkim/opendkim_2.11.0~beta2-5.dsc

Changes since the last upload:

 opendkim (2.11.0~beta2-5) unstable; urgency=medium
 .
   * opendkim-tools: Do not install obsolete opendkim-convert-keylist script.
   * Add new patches:
     - cve-2020-12272.patch: Mitigation for CVE-2020-12272.
     - opendkim-genkey-typo.patch: Correct typo in man page (Closes: #960447).
     - replace-headers.patch: Fix ReplaceHeaders parameter (Closes: #986878).
     - insheader.patch: Insert trace headers at index 0.
     - mlfi_close.patch: Fix segfault due to use-after-free in mlfi_close.
     - conf_refcnt.patch: Remove invalid assert statement.
   * debian/control: Set "Rules-Requires-Root: no".
   * Bump Standards-Version to 4.6.0 without further changes.

The Lintian error and warning are problems of Lintian, not of this
package. (Lintian needs an update for the Standards-Version bump, and
the /usr/lib/systemd/system issue is work in progress #992465.)

Thank you!
David


Reply to: