slackware-current/extra/source/sendmail/site.config.m4
Patrick J Volkerding f75fcd750e Wed Jan 31 21:19:19 UTC 2024
ap/nvme-cli-2.7.1-x86_64-1.txz:  Upgraded.
l/libnvme-1.7.1-x86_64-1.txz:  Added.
  This is required by nvme-cli.
l/pipewire-1.0.2-x86_64-1.txz:  Upgraded.
n/curl-8.6.0-x86_64-1.txz:  Upgraded.
n/libmilter-8.18.1-x86_64-1.txz:  Upgraded.
extra/sendmail/sendmail-8.18.1-x86_64-1.txz:  Upgraded.
  sendmail through 8.17.2 allows SMTP smuggling in certain configurations.
  Remote attackers can use a published exploitation technique to inject e-mail
  messages with a spoofed MAIL FROM address, allowing bypass of an SPF
  protection mechanism. This occurs because sendmail supports <LF>.<CR><LF>
  but some other popular e-mail servers do not. This is resolved in 8.18 and
  later versions with 'o' in srv_features.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-51765
  (* Security fix *)
extra/sendmail/sendmail-cf-8.18.1-noarch-1.txz:  Upgraded.
2024-01-31 23:07:15 +01:00

5 lines
386 B
Text

APPENDDEF(`confMAPDEF', `-DNEWDB')
APPENDDEF(`confLIBS', `-lnsl -lssl -lcrypto -lsasl2 -lwrap -lm -ldb -lresolv -licuuc -licui18n -licudata')
APPENDDEF(`conf_libmilter_ENVDEF', `-DMILTER')
APPENDDEF(`conf_sendmail_ENVDEF', `-DMILTER')
APPENDDEF(`confENVDEF', `-DNETINET6 -DIPV6_FULL -DNEWDB -DSTARTTLS -DDANE -DSASL=2 -DTCPWRAPPERS -DNIS -DMAP_REGEX -DSOCKETMAP -DTLS_EC -DUSE_EAI')dnl