Your message dated Sat, 14 Jan 2017 12:37:03 +0000 with message-id <1484397423.1091.25.camel@adam-barratt.org.uk> and subject line Closing requests included in today's point release has caused the Debian Bug report #849967, regarding jessie-pu: package exim4/4.84.2-2+deb8u3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 849967: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849967 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: jessie-pu: package exim4/4.84.2-2+deb8u3
- From: Andreas Metzler <ametzler@bebt.de>
- Date: Mon, 2 Jan 2017 19:44:53 +0100
- Message-id: <[🔎] 20170102184438.xtkvno3aptnv36bq@argenau.bebt.de>
Package: release.debian.org Severity: normal Tags: jessie User: release.debian.org@packages.debian.org Usertags: pu Hello, I (and Heiko from exim upstream) would like to fix #845569 in jessie. sid/testing already include the fix, it was part of 4.88~RC6. The issue is a memleak in the GnuTLS code, the patch is a towo line change. Heiko has provided a very nice writeup in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845569#20 thanks, cu Andreas -- `What a good friend you are to him, Dr. Maturin. His other friends are so grateful to you.' `I sew his ears on from time to time, sure'diff -Nru exim4-4.84.2/debian/changelog exim4-4.84.2/debian/changelog --- exim4-4.84.2/debian/changelog 2016-12-22 12:17:01.000000000 +0100 +++ exim4-4.84.2/debian/changelog 2017-01-02 19:42:06.000000000 +0100 @@ -1,3 +1,11 @@ +exim4 (4.84.2-2+deb8u3) jessie; urgency=medium + + * 94_Fix-memory-leak-on-Gnu-TLS-close.patch from upstream exim-4_84_2+fixes + branch: Fix GnuTLS memory leak. (Thanks, Heiko Schlittermann!) + Closes: #845569 + + -- Andreas Metzler <ametzler@debian.org> Mon, 02 Jan 2017 19:18:05 +0100 + exim4 (4.84.2-2+deb8u2) jessie-security; urgency=high * Non-maintainer upload by the Security Team. diff -Nru exim4-4.84.2/debian/patches/94_Fix-memory-leak-on-Gnu-TLS-close.patch exim4-4.84.2/debian/patches/94_Fix-memory-leak-on-Gnu-TLS-close.patch --- exim4-4.84.2/debian/patches/94_Fix-memory-leak-on-Gnu-TLS-close.patch 1970-01-01 01:00:00.000000000 +0100 +++ exim4-4.84.2/debian/patches/94_Fix-memory-leak-on-Gnu-TLS-close.patch 2016-12-31 17:46:00.000000000 +0100 @@ -0,0 +1,52 @@ +From 867e8fe25dbfb1e31493488ad695bde55b890397 Mon Sep 17 00:00:00 2001 +From: "Heiko Schlittermann (HS12-RIPE)" <hs@schlittermann.de> +Date: Wed, 23 Nov 2016 12:02:26 +0100 +Subject: [PATCH] Fix memory leak on (Gnu)TLS close. + +This leak doesn't show up under normal operation, as the process +normally dies right after closing the session. + +But during callout repetitive TLS sessions are opened and closed from +the same process (the process receiving the message). Depending on +the amount of RAM and the number of callouts the same process does, +this may be a problem. (On an amd64 machine with 4GB RAM, at about 1000 +recipients the memory is exhausted.) + +(cherry picked from commit ed62aae3051c9a713d35c8ae516fbd193d1401ba) +--- + src/tls-gnu.c | 5 +++++ + 1 file changed, 5 insertions(+) + +diff --git a/src/tls-gnu.c b/src/tls-gnu.c +index 61ed0e81..670f8cbc 100644 +--- a/src/tls-gnu.c ++++ b/src/tls-gnu.c +@@ -1729,6 +1729,7 @@ if (rc != GNUTLS_E_SUCCESS) + + if (!sigalrm_seen) + { ++ gnutls_certificate_free_credentials(state->x509_cred); + (void)fclose(smtp_out); + (void)fclose(smtp_in); + } +@@ -2014,6 +2015,8 @@ if (shutdown) + } + + gnutls_deinit(state->session); ++gnutls_certificate_free_credentials(state->x509_cred); ++ + + state->tlsp->active = -1; + memcpy(state, &exim_gnutls_state_init, sizeof(exim_gnutls_state_init)); +@@ -2074,6 +2077,8 @@ if (state->xfer_buffer_lwm >= state->xfer_buffer_hwm) + receive_smtp_buffered = smtp_buffered; + + gnutls_deinit(state->session); ++ gnutls_certificate_free_credentials(state->x509_cred); ++ + state->session = NULL; + state->tlsp->active = -1; + state->tlsp->bits = 0; +-- +2.11.0 + diff -Nru exim4-4.84.2/debian/patches/series exim4-4.84.2/debian/patches/series --- exim4-4.84.2/debian/patches/series 2016-12-22 12:17:01.000000000 +0100 +++ exim4-4.84.2/debian/patches/series 2016-12-31 17:45:15.000000000 +0100 @@ -23,3 +23,4 @@ 91_Expansions-Fix-crash-in-crypteq-On-OpenBSD-a-bad-sec.patch 92_CVE-2016-1238.diff 93_CVE-2016-9963-Fix-DKIM-information-leakage.patch +94_Fix-memory-leak-on-Gnu-TLS-close.patchAttachment: signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
- To: 823517-done@bugs.debian.org, 829606-done@bugs.debian.org, 836795-done@bugs.debian.org, 836823-done@bugs.debian.org, 837105-done@bugs.debian.org, 837428-done@bugs.debian.org, 837558-done@bugs.debian.org, 837575-done@bugs.debian.org, 837607-done@bugs.debian.org, 838396-done@bugs.debian.org, 838780-done@bugs.debian.org, 838869-done@bugs.debian.org, 838882-done@bugs.debian.org, 839242-done@bugs.debian.org, 839531-done@bugs.debian.org, 839656-done@bugs.debian.org, 839731-done@bugs.debian.org, 839814-done@bugs.debian.org, 839907-done@bugs.debian.org, 839927-done@bugs.debian.org, 840127-done@bugs.debian.org, 840188-done@bugs.debian.org, 840191-done@bugs.debian.org, 840350-done@bugs.debian.org, 840378-done@bugs.debian.org, 840379-done@bugs.debian.org, 840942-done@bugs.debian.org, 841462-done@bugs.debian.org, 841681-done@bugs.debian.org, 841767-done@bugs.debian.org, 841979-done@bugs.debian.org, 842013-done@bugs.debian.org, 842509-done@bugs.debian.org, 842938-done@bugs.debian.org, 843171-done@bugs.debian.org, 843268-done@bugs.debian.org, 843411-done@bugs.debian.org, 843426-done@bugs.debian.org, 843508-done@bugs.debian.org, 843775-done@bugs.debian.org, 843999-done@bugs.debian.org, 844150-done@bugs.debian.org, 844161-done@bugs.debian.org, 844746-done@bugs.debian.org, 845156-done@bugs.debian.org, 845263-done@bugs.debian.org, 845387-done@bugs.debian.org, 845443-done@bugs.debian.org, 845474-done@bugs.debian.org, 845564-done@bugs.debian.org, 845570-done@bugs.debian.org, 846017-done@bugs.debian.org, 846031-done@bugs.debian.org, 846352-done@bugs.debian.org, 846948-done@bugs.debian.org, 847273-done@bugs.debian.org, 847921-done@bugs.debian.org, 848341-done@bugs.debian.org, 848610-done@bugs.debian.org, 848829-done@bugs.debian.org, 848908-done@bugs.debian.org, 848926-done@bugs.debian.org, 848942-done@bugs.debian.org, 849004-done@bugs.debian.org, 849020-done@bugs.debian.org, 849175-done@bugs.debian.org, 849438-done@bugs.debian.org, 849467-done@bugs.debian.org, 849538-done@bugs.debian.org, 849698-done@bugs.debian.org, 849725-done@bugs.debian.org, 849865-done@bugs.debian.org, 849869-done@bugs.debian.org, 849962-done@bugs.debian.org, 849967-done@bugs.debian.org, 850084-done@bugs.debian.org, 850154-done@bugs.debian.org, 850214-done@bugs.debian.org, 850539-done@bugs.debian.org, 850542-done@bugs.debian.org, 850563-done@bugs.debian.org, 850566-done@bugs.debian.org, 850567-done@bugs.debian.org, 838109-done@bugs.debian.org, 849488-done@bugs.debian.org
- Subject: Closing requests included in today's point release
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 14 Jan 2017 12:37:03 +0000
- Message-id: <1484397423.1091.25.camel@adam-barratt.org.uk>
Version: 8.7 Hi, Each of these bugs refers to an update that was included in today's 8.7 point release. Regards, Adam
--- End Message ---