Commit graph

10732 commits

Author SHA1 Message Date
gavan
1e5a416eff exim: fix crash on startup if log_buffer is allocated right after taint pool
The check whether a block of memory is tainted erroneously returns true
if the block in question starts the very next byte after a block in the
tainted pool. Depending on the memory allocator, this can cause problems.
For example, on NetBSD/amd64 9.0, this seems to allocate the first tainted
block immediately before log_buffer. This leads to a recursive error in
log_write the first time anything is written to the log, leading to a
segmentation fault when the stack fills up.
2020-08-20 16:40:57 +00:00
leot
b13a568190 *: revbump for libsndfile 2020-08-18 17:57:24 +00:00
tnn
cdb6524f27 dkim-milter: NOT_FOR_UNPRIVILEGED (because of PKG_DESTDIR_SUPPORT=destdir) 2020-08-18 03:30:03 +00:00
tnn
5d6dc22553 courier-imap: cannot be built in unprivileged mode 2020-08-18 02:40:08 +00:00
leot
953ab724e1 *: revbump after fontconfig bl3 changes (libuuid removal) 2020-08-17 20:19:01 +00:00
leot
0e49372c4e *: revbump after fontconfig bl3 changes (libuuid removal) 2020-08-17 20:17:15 +00:00
otis
faae6a58a9 Add php-mailparse into tree. 2020-08-16 21:21:12 +00:00
otis
26f43b6cc1 Add php-mailparse 3.1.0, a PECL class for parsing and working
with email messages. It can deal with rfc822 and rfc2045 (MIME) compliant
messages.
2020-08-16 15:51:45 +00:00
wiz
801f9ce893 opendmarc: add missing dependency
Reported by Richard Sass on pkgsrc-users.

Bump PKGREVISION.
2020-08-16 08:36:18 +00:00
tnn
af4fdbe790 dbmail: update to 3.2.5
3.2.5
Added
  IMAP Daemon: added switch to control the diffential state reload
    (mailbox_update_strategy=2), more information in dbmail.conf,
    mailbox_update_strategy_2_max_iterations [#81]
  IMAP Daemon: added switch to control UNSEEN first message in SELECT commands

Changed
  IMAP Daemon: allow reporting UID COPY success in case of various failures
    (except quota), reporting issues are sent to error log as warnings [#87]

Optimizations
  optimizing differential state [#81]
  optimizing fetch message headers [#85]

Issues
  fixing issue related to copy message in regard to RFC 3501, section 6.4.8
  fixing issues related group_concat for PostgreSql [#75], [#78]
  fixing issue related to lastRowId [#71]
  fixing issues related with differential update [#70], [#73]
  fixing proc not being used in BSD systems [#74]
  IMAP Daemon: segmentation fault [#68]

3.2.4
Added
  IMAP Daemon: mailbox-update-strategy switch (see dbmail.conf), experimental
  support for application_name in database connection uri
  IMAP Daemon: mailbox_search_strategy switch (see dbmail.conf)

Changed
  systemd unit changed to type notify
  mailbox state is build using only valid messages [#39]

Optimizations
  IMAP Daemon: optimization of sql queries in relation to message headers
  libevent increased priority on accepting new connections
  libevent optimization on reading and writing to sockets
  simplify libzdb configuration (AC_CHECK_HEADERS)

Issues
  fix segmentation fault in imap_append_hash_as_string [#12]
  dbmail-users: sql issue on deleting alias user [#18]
  IMAP Daemon: generation of invalid BODYSTRUCTURE in Content-Type field [#23]
  fix support for jemalloc latest version [#35]
  IMAP Deamon: BYE Command now offers optional message even on normal operations
  IMAP Deamon: idle message now offers optional message (* OK Still Here)
  IMAP Daemon: random hangs when single user is connected [#37]
  fix fd leaks
  IMAP Daemon: fix MODIFIED keyword, too many '[' and ']'
  fix segmentation fault in find_end_of_header
  fix gcc 10 compilation issue, duplicated definition
2020-08-15 10:52:50 +00:00
wiz
c02712e862 neomutt: update to 20200814.
2020-08-14  Richard Russon  <rich@flatcap.org>
* Security
  - Add mitigation against DoS from thousands of parts
* Features
  - Allow index-style searching in postpone menu
  - Open NeoMutt using a mailbox name
  - Add `cd` command to change the current working directory
  - Add tab-completion menu for patterns
  - Allow renaming existing mailboxes
  - Check for missing attachments in alternative parts
  - Add one-liner docs to config items
* Bug Fixes
  - Fix logic in checking an empty From address
  - Fix Imap crash in `cmd_parse_expunge()`
  - Fix setting attributes with S-Lang
  - Fix: redrawing of `$pager_index_lines`
  - Fix progress percentage for syncing large mboxes
  - Fix sidebar drawing in presence of indentation + named mailboxes
  - Fix retrieval of drafts when "postponed" is not in the mailboxes list
  - Do not add comments to address group terminators
  - Fix alias sorting for degenerate addresses
  - Fix attaching emails
  - Create directories for nonexistent file hcache case
  - Avoid creating mailboxes for failed subscribes
  - Fix crash if rejecting cert
* Changed Config
  - Add `$copy_decode_weed`, `$pipe_decode_weed`, `$print_decode_weed`
  - Change default of `$crypt_protected_headers_subject` to "..."
  - Add default keybindings to history-up/down
* Translations
  - 100% Czech
  - 100% Spanish
* Build
  - Allow building against Lua 5.4
  - Fix when sqlite3.h is missing
* Docs
  - Add a brief section on stty to the manual
  - Update section "Terminal Keybindings" in the manual
  - Clarify PGP Pseudo-header `S<id>` duration
* Code
  - Clean up String API
  - Make the Sidebar more independent
  - De-centralise the Config Variables
  - Refactor dialogs
  - Refactor: Help Bar generation
  - Make more APIs Context-free
  - Adjust the edata use in Maildir and Notmuch
  - Window refactoring
  - Convert libsend to use Config functions
  - Refactor notifications to reduce noise
  - Convert Keymaps to use STAILQ
  - Track currently selected email by msgid
  - Config: no backing global variable
  - Add events for key binding
* Upstream
  - Fix imap postponed mailbox use-after-free error
  - Speed up thread sort when many long threads exist
  - Fix ~v tagging when switching to non-threaded sorting
  - Add message/global to the list of known "message" types
  - Print progress meter when copying/saving tagged messages
  - Remove ansi formatting from autoview generated quoted replies
  - Change postpone mode to write Date header too
  - Unstuff `format=flowed`
2020-08-14 20:09:53 +00:00
bsiegert
9fad3613b8 Revbump all Go packages after go114 update 2020-08-14 20:01:19 +00:00
taca
5f2390cadc mail/dovecot2-pigeonhole: distfile changes
Distfile changes.

1. Official annoucne says "The only change here is that the configure.ac
   file has correctly formatted version number."

2. Name of distfile is changed to match previous file naming scheme.
   Old distfile is still available.

3. automake 1.15.1 is used instead of previous 1.15.  So, generated files
   by it are changed.

4. Other files are not changed, so there is no functional change.

Bump PKGREVISION.
2020-08-13 15:28:45 +00:00
schmonz
d2284fe0bf Set CMAKE_INSTALL_NAME_DIR to lib/rspamd so that shlibs are built with
correct install_name_tool -id on macOS, where this fixes CHECK_SHLIBS
(and probably runtime behavior too). While here, the patch to link with
-lrt on NetBSD has been upstreamed; remove. Bump PKGREVISION.
2020-08-12 20:00:30 +00:00
taca
8e0b3fff87 mail/dovecot2-pigeonhole: update to 0.5.11
Update dovecot2-pigeonhole to 0.5.11.


v0.5.11 2020-08-12  Aki Tuomi <aki.tuomi@open-xchange.com>

	* managesieve: managesieve_max_line_length setting is now a "size" type
	  instead of just number of bytes. This allows using e.g. "64k" as the
	  value.
	- lib-sieve: When folding white space is used in the Message-ID header,
	  it is not stripped away correctly before the message ID value is used,
	  causing e.g. garbled log lines at delivery.
2020-08-12 15:58:02 +00:00
taca
326aadf108 mail/dovocot2: update to 2.3.11.3
Update dovecot2 and related packages to 2.3.11.3.

v2.3.11.3 2020-07-29	Aki Tuomi <aki.tuomi@open-xchange.com>

	- pop3-login: Login didn't handle commands in multiple IP packets properly.
	  This mainly affected large XCLIENT commands or a large SASL initial
	  response parameter in the AUTH command.
	- pop3: pop3_deleted_flag setting was broken, causing:
	  Panic: file seq-range-array.c: line 472 (seq_range_array_invert):
	  assertion failed: (range[count-1].seq2 <= max_seq)

v2.3.11.2 2020-07-13	Aki Tuomi <aki.tuomi@open-xchange.com>

	- auth: Lua passdb/userdb leaks stack elements per call, eventually
	  causing the stack to become too deep and crashing the auth or
	  auth-worker process.
	- lib-mail: v2.3.11 regression: MIME parts not returned correctly by
	  Dovecot MIME parser.
	- pop3-login: Login would fail with "Input buffer full" if the initial
	  response for SASL was too long.

v2.3.11 2020-06-17  Aki Tuomi <aki.tuomi@open-xchange.com>

	* CVE-2020-12100: Parsing mails with a large number of MIME parts could
	  have resulted in excessive CPU usage or a crash due to running out of
	  stack memory.
	* CVE-2020-12673: Dovecot's NTLM implementation does not correctly check
	  message buffer size, which leads to reading past allocation which can
	  lead to crash.
	* CVE-2020-12674: Dovecot's RPA mechanism implementation accepts
	  zero-length message, which leads to assert-crash later on.
	* Events: Fix inconsistency in events. See event documentation in
	  https://doc.dovecot.org.
	* imap_command_finished event's cmd_name field now contains "unknown"
	  for unknown commands. A new "cmd_input_name" field contains the
	  command name exactly as it was sent.
	* lib-index: Renamed mail_cache_compress_* settings to mail_cache_purge_*.
	  Note that these settings are mainly intended for testing and usually
	  shouldn't be changed.
	* events: Renamed "index" event category to "mail-index".
	* events: service:<name> category is now using the name from
	  configuration file.
	* dns-client: service dns_client was renamed to dns-client.
	* log: Prefixes generally use the service name from configuration file.
	  For example dict-async service will now use
	  "dict-async(pid): " log prefix instead of "dict(pid): "
	* *-login: Changed logging done by proxying to use a consistent prefix
	  containing the IP address and port.
	* *-login: Changed disconnection log messages to be slightly clearer.
	+ dict: Add events for dictionaries.
	+ lib-index: Finish logging with events.
	+ oauth2: Support local validation of JWT tokens.
	+ stats: Add support for dynamic histograms and grouping. See
	  https://doc.dovecot.org/configuration_manual/stats/.
	+ imap: Implement RFC 8514: IMAP SAVEDATE
	+ lib-index: If a long-running transaction (e.g. SORT/FETCH on a huge
	  folder) adds a lot of data to dovecot.index.cache file, commit those
	  changes periodically to make them visible to other concurrent sessions
	  as well.
	+ stats: Add OpenMetrics exporter for statistics. See
	  https://doc.dovecot.org/configuration_manual/stats/openmetrics/.
	+ stats: Support disabling stats-writer socket by setting
	  stats_writer_socket_path="".
	- auth-worker: Process keeps slowly increasing its memory usage and
	  eventually dies with "out of memory" due to reaching vsz_limit.
	- auth: Prevent potential timing attacks in authentication secret
	  comparisons: OAUTH2 JWT-token HMAC, imap-urlauth token, crypt() result.
	- auth: Several auth-mechanisms allowed input to be truncated by NUL
	  which can potentially lead to unintentional issues or even successful
	  logins which should have failed.
	- auth: When auth policy returned a delay, auth_request_finished event
	  had policy_result=ok field instead of policy_result=delayed.
	- auth: auth process crash when auth_policy_server_url is set to an
	  invalid URL.
	- dict-ldap: Crash occurs if var_expand template expansion fails.
	- dict: If dict client disconnected while iteration was still running,
	  dict process could have started using 100% CPU, although it was still
	  handling clients.
	- doveadm: Running doveadm commands via proxying may hang, especially
	  when doveadm is printing a lot of output.
	- imap: "MOVE * destfolder" goes to a loop copying the last mail to the
	  destination until the imap process dies due to running out of memory.
	- imap: Running "UID MOVE 1:* Trash" on an empty folder goes to infinite
	  loop.
	- imap: SEARCH doesn't support $.
	- lib-compress: Buffer over-read in zlib stream read.
	- lib-dns: If DNS lookup times out, lib-dns can cause crash in calling
	  process.
	- lib-index: Fixed several bugs in dovecot.index.cache handling that
	  could have caused cached data to be lost.
	- lib-index: Writing to >=1 GB dovecot.index.cache files may cause
	  assert-crashes:
	  Panic: file mail-index-util.c: line 37 (mail_index_uint32_to_offset):
	  assertion failed: (offset < 0x40000000)
	- lib-ssl-iostream: Fix buggy OpenSSL error handling without
	  assert-crashing. If there is no error available, log it as an error
	  instead of crashing:
	  Panic: file iostream-openssl.c: line 599 (openssl_iostream_handle_error):
	  assertion failed: (errno != 0)
	- lib-ssl-iostream: ssl_key_password setting did not work.
	- submission: A segfault crash may occur when the client or server
	  disconnects while a non-transaction command like NOOP or VRFY is still
	  being processed.
	- virtual: Copying/moving mails with IMAP into a virtual folder assert-crashes:
	  Panic: file cmd-copy.c: line 152 (fetch_and_copy): assertion failed:
	  (copy_ctx->copy_count == seq_range_count(&copy_ctx->saved_uids))
2020-08-12 15:54:38 +00:00
taca
a929c817f1 mail/roundcube: update to 1.4.8
Update roundcube to 1.4.8, security release.


RELEASE 1.4.8
-------------
- Security: Fix potential XSS issue in HTML editor of the identity signature input (#7507)
- Managesieve: Fix too-small input field in Elastic when using custom headers (#7498)
- Fix support for an error as a string in message_before_send hook (#7475)
- Elastic: Fix redundant scrollbar in plain text editor on mail reply (#7500)
- Elastic: Fix deleted and replied+forwarded icons on messages list (#7503)
- Managesieve: Allow angle brackets in out-of-office message body (#7518)
- Fix bug in conversion of email addresses to mailto links in plain text messages (#7526)
- Fix format=flowed formatting on plain text part derived from the HTML content (#7504)
- Fix incorrect rewriting of internal links in HTML content (#7512)
- Fix handling links without defined protocol (#7454)
- Fix paging of search results on IMAP servers with no SORT capability (#7462)
- Fix detecting special folders on servers with both SPECIAL-USE and LIST-STATUS (#7525)
- Security: Fix cross-site scripting (XSS) via HTML messages with malicious svg content [CVE-2020-16145]
- Security: Fix cross-site scripting (XSS) via HTML messages with malicious math content
2020-08-10 22:30:41 +00:00
wiz
7cdcbaf495 rspamd: create the maps.d directory in sysconfdir.
Needed for binary packages.

Bump PKGREVISION.
2020-08-08 14:35:37 +00:00
schmonz
b301b44dcb Update to 3.12.1. From the changelog:
* Fix calling opmlexport without arguments
2020-08-03 07:57:43 +00:00
schmonz
44bda70a95 Update to 3.12. From the changelog:
* Drop support for EOL Python 3.4, add support for Python 3.8
* Add List_ID and List_Post headers to the generated emails
* Add a new `reply-changes` setting
* Improve configurability of text wrapping for the emails
* Use `platform.node()` instead of "dev.null.invalid" in
  "Message-ID" header
* Improve locking support for when multiple rss2email instances are run
  in parallel
* Fix handling of __VERSION__ and __URL__ in user-agent strings
* Fix opmlexport
2020-08-02 20:59:09 +00:00
oster
2e17c15b0f Bump pkgrevision. Thanks, Joerg. 2020-07-27 22:28:47 +00:00
oster
c6f7694c8a Fix resource leakage observed when using opendmarc on NetBSD.
Use res_ndestroy() instead of res_nclose() to properly cleanup resources
on NetBSD (and others that use __res_ndestroy() or res_ndestroy() instead
of res_nclose()).  Original patch by Roy Marples.
2020-07-27 20:41:09 +00:00
wen
a5da5ef733 Update to 1.20200331.1
Upstream changes:
1.20200331.1 2020-03-31 03:31:13+00:00 UTC
        - Treat an undefined value as emptystring in search
2020-07-23 11:18:29 +00:00
wen
77a96eb94b Update to 3.005
Upstream changes:
version 3.005: Wed 22 Jul 10:40:05 CEST 2020

        Improvements:
        - warn to use ::SMTP, not ::SendMail on bulk messages.
        - much lower elapse time on ::SMTP (local?) delivery.

version 3.004: Fri  3 May 09:29:07 CEST 2019

        Improvements:
        - add imap/imap4
2020-07-23 11:14:41 +00:00
schmonz
4a98825356 Remove outdated MESSAGE. Add local copies of online manpages. Bump PKGREVISION. 2020-07-18 13:31:44 +00:00
wiz
5eff19ff66 thunderbird-enigmail: update to 2.1.7.
Enigmail 2.1.7

Released 2020-06-27, works with Thunderbird 68 and Postbox 7.

Notable Changes

This release displays information about the upcoming release of Thunderbird 78.
2020-07-17 23:33:12 +00:00
bsiegert
20b9b74c5f Revbump all Go packages after go114 update. 2020-07-17 18:04:11 +00:00
tron
4c925c3d48 mutt: Update to version 1.14.6
This is a bug-fix release fixing a problem resetting access times that snuck
in starting with 1.11.0.  This only affected relative-path mailboxes, but
caused Mutt to "forget" new mail in mbox files.
2020-07-12 07:08:43 +00:00
ryoon
10a36091d4 notmuch: Update to 0.30
Changelog:
Notmuch 0.30 (2020-07-10)
=========================

S/MIME
------

Handle S/MIME (PKCS#7) messages -- one-part signed messages, encrypted
messages, and multilayer messages. Treat them symmetrically to
OpenPGP messages. This includes handling protected headers
gracefully.

If you're using Notmuch with S/MIME, you currently need to configure
gpgsm appropriately.

Mixed-up MIME Repair
--------------------

Detect and automatically repair a common form of message mangling
created by Microsoft Exchange (see index.repaired=mixedup in
notmuch-properties(7)).

Protected Headers
-----------------

Avoid indexing the legacy-display part of an encrypted message that
has protected headers (see
index.repaired=skip-protected-headers-legacy-display in
notmuch-properties(7)).

Python
------

Drop support for python2, focus on python3.

Introduce new CFFI-based python bindings in the python module named
"notmuch2".  Officially deprecate (but still support) the older
"notmuch" module.

Dependencies
------------

Support for Xapian 1.2 is removed. The minimum supported version of
Xapian is now 1.4.0.

Notmuch 0.29.3 (2019-11-27)
===========================

General
-------

Fix for use-after-free in notmuch_config_list_{key,val}.

Fix for double close of file in notmuch-dump.

Debian
------

Drop python2 support from shipped debian packaging.

Notmuch 0.29.2 (2019-10-19)
===========================

General
-------

Fix for file descriptor leak when opening gzipped mail files. Thanks
to James Troup for the bug report and the fix.

Notmuch 0.29.1 (2019-06-11)
===========================

Build
-----

Fix for installation failure with `configure --without-emacs`.
2020-07-12 01:48:36 +00:00
taca
2dc1006b11 mail/roundcube: update to 1.4.7
Update roundcube to 1.4.7.


RELEASE 1.4.7
-------------
- Fix bug where subfolders of special folders could have been duplicated on folder list
- Increase maximum size of contact jobtitle and department fields to 128 characters
- Fix missing newline after the logged line when writing to stdout (#7418)
- Elastic: Fix context menu (paste) on the recipient input (#7431)
- Fix problem with forwarding inline images attached to messages with no HTML part (#7414)
- Fix problem with handling attached images with same name when using database_attachments/redundant_attachments (#7455)
- Security: Fix cross-site scripting (XSS) via HTML messages with malicious svg/namespace
2020-07-07 04:37:26 +00:00
schmonz
d517291f5b Skip building and installing API docs with Doxygen, as suggested
by the author. Bump PKGREVISION.
2020-07-04 14:11:40 +00:00
ryoon
7c23adaf4d thunderbird-l10n: Update to 68.10.0
* Sync with mail/thunderbird-l10n-68.10.0.
2020-07-04 05:12:51 +00:00
ryoon
6c08394a83 thunderbird: Update to 68.10.0
Changelog:
Fixes

fixed Chat: Topics displayed some characters improperly
fixed Calendar: Filtering tasks did not work when "Incomplete Tasks" was selected

Security fixes:
CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64
#CVE-2020-12418: Information disclosure due to manipulated URL object
#CVE-2020-12419: Use-after-free in nsGlobalWindowInner
#CVE-2020-12420: Use-After-Free when trying to connect to a STUN server
#MFSA-2020-0001: Automatic account setup leaks Microsoft Exchange login credentials
#CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates
2020-07-04 05:11:25 +00:00
schmonz
65fd92e30d Build with OpenSSL 1.1.x. While here, wrap long line in MESSAGE. 2020-07-02 08:50:09 +00:00
nia
0982bc8b2f thunderbird: Remove cargo SUBSTs, there's no clear patches for rust crates 2020-07-01 09:19:13 +00:00
rillig
1deaf712fa mail/thunderbird: remove commented-out SUBST block 2020-07-01 07:18:14 +00:00
schmonz
f404dc68dc Modernize patch filenames. NFCI. 2020-06-30 17:15:28 +00:00
taca
24fb6a0680 mail/pear-Mail_Mime: update to 1.10.9
Update pear-Mail_Mime to 1.10.9.


1.10.9 (2020-06-27 04:37 UTC)

Changelog:

* Added a workaround for an opcache bug on OpenSuse 15.1 [alec]
2020-06-30 15:26:02 +00:00
taca
652c5e8d1c mail/postfix: update to 3.5.4
Update postfix to 3.5.4.


Fixed in Postfix 3.5.4, 3.4.14:

  * The connection_reuse attribute in smtp_tls_policy_maps always
    resulted in an "invalid attribute name" error. Fix by Thorsten
    Habich.

  * SMTP over TLS connection reuse always failed for Postfix SMTP
    client configurations that specify explicit trust anchors (remote
    SMTP server certificates or public keys). Reported by Thorsten
    Habich.

Fixed in Postfix versions 3.5.4, 3.4.14, 3.3.12, 3.2.17:

  * The Postfix SMTP client's DANE implementation would always send
    an SNI option with the name in a destination's MX record, even
    if the MX record pointed to a CNAME record. MX records that
    point to CNAME records are not conformant with RFC5321, and so
    are rare.

    Based on the DANE survey of ~2 million hosts it was found that
    with the corrected SMTP client behavior, sending SNI with the
    CNAME-expanded name, the SMTP server would not send a different
    certificate. This fix should therefore be safe.
2020-06-30 15:00:45 +00:00
schmonz
4861b2cd58 Modernize patch filenames, adding patch comments. NFCI. 2020-06-30 13:40:53 +00:00
nia
af5d6328f9 Detect if gtk3 was built with Wayland properly in Mozilla packages.
thanks jperkin for the hint.
2020-06-29 11:53:09 +00:00
schmonz
c8c4529c1b Assign non-default SUBST_FILES.djberrno with =, not += (because it
doesn't actually append).
2020-06-26 16:37:22 +00:00
schmonz
3948870bde Retire 'djbware-errno-hack' and associated options.mk cleverness.
Instead:

1. Package makefiles including their own options.mk
2. Packages say "SUBST_CLASSES+=djberrno" to get the hack, if needed
3. Packages adjust SUBST_FILES.djberrno, if needed

Should fix bulk build failures due to multiple inclusions of options.mk
and/or incorrect definitions of DJB_ERRNO_HACK.

Approved during the freeze by wiz@.
2020-06-25 05:42:36 +00:00
wiz
e9a209ef86 mutt: update to 1.14.5.
This release fixes a regression from the 1.14.3 release.  Encryption settings
are no longer checked when using $tunnel to connect to a preauthenticated IMAP
server.
2020-06-24 06:34:02 +00:00
wiz
f48f075a76 mutt: update to 1.14.4.
Remove some patches that would get voting rights soon.
Remove support for NetBSD 1.5.
pkglint cleanup.
XXX: someone should send the remaining patches upstream.

Mutt 1.14.4 was released on June 18, 2020. This is an important
bug-fix release. It fixes a possible machine-in-the-middle response
injection attack when using STARTTLS with IMAP, POP3, and SMTP
(CVE-2020-14954).

Mutt 1.14.3 was released on June 14, 2020. This is an important
bug-fix release. It fixes a possible IMAP fcc/postpone
machine-in-the-middle attack (CVE-2020-14093). It also fixes some
GnuTLS certificate prompt issues.

Mutt 1.14.2 was released on May 25, 2020. This is a bug-fix release,
fixing a few prompt buffer-size issues and adding a potential DoS
mitigation.

Mutt 1.14.1 was released on May 16, 2020. This is a bug-fix release,
fixing a documentation build issue and a few other small bugs.

Mutt 1.14.0 was released on May 2, 2020. This release has new
features and bug fixes. See the UPDATING file, or for more details
see the release notes page.
2020-06-22 06:24:15 +00:00
wiz
19e5628cfc neomutt: update to 20200619.
2020-06-19  Richard Russon  <rich@flatcap.org>
* Security
  - Abort GnuTLS certificate check if a cert in the chain is rejected
  - TLS: clear data after a starttls acknowledgement
  - Prevent possible IMAP MITM via PREAUTH response
* Features
  - add config operations +=/-= for number,long
  - Address book has a comment field
  - Query menu has a comment field
* Contrib
  - sample.neomuttrc-starter: Do not echo promted password
* Bug Fixes
  - make "news://" and "nntp://" schemes interchangeable
  - Fix CRLF to LF conversion in base64 decoding
  - Double comma in query
  - compose: fix redraw after history
  - Crash inside empty query menu
  - mmdf: fix creating new mailbox
  - mh: fix creating new mailbox
  - mbox: error out when an mbox/mmdf is a pipe
  - Fix list-reply by correct parsing of List-Post headers
  - Decode references according to RFC2047
  - fix tagged message count
  - hcache: fix keylen not being considered when building the full key
  - sidebar: fix path comparison
  - Don't mess with the original pattern when running IMAP searches
  - Handle IMAP "NO" resps by issuing a msg instead of failing badly
  - imap: use the connection delimiter if provided
  - Memory leaks
* Changed Config
  - `$alias_format` default changed to include `%c` comment
  - `$query_format` default changed to include `%e` extra info
* Translations
  - 100% Lithuanian
  - 84% French
  - Log the translation in use
* Docs
  - Add missing commands unbind, unmacro to man pages
* Build
  - Check size of long using `LONG_MAX` instead of `__WORDSIZE`
  - Allow ./configure to not record cflags
  - fix out-of-tree build
  - Avoid locating gdbm symbols in qdbm library
* Code
  - Refactor unsafe TAILQ returns
  - add window notifications
  - flip negative ifs
  - Update to latest acutest.h
  - test: add store tests
  - test: add compression tests
  - graphviz: email
  - make more opcode info available
  - refactor: `main_change_folder()`
  - refactor: `mutt_mailbox_next()`
  - refactor: `generate_body()`
  - compress: add `{min,max}_level` to ComprOps
  - emphasise empty loops: "// do nothing"
  - prex: convert `is_from()` to use regex
  - Refactor IMAP's search routines

2020-05-01  Richard Russon  <rich@flatcap.org>
* Bug Fixes
  - Make sure buffers are initialized on error
  - fix(sidebar): use abbreviated path if possible
* Translations
  - 100% Lithuanian
* Docs
  - make header cache config more explicit
2020-06-22 06:08:35 +00:00
mef
ab32bbc19a (mail/mailagent) Fix -> $* is no longer supported, I am not sure,sorry 2020-06-21 07:35:25 +00:00
leot
55dfe877fa mpop: Update to 1.4.10
pkgsrc changes:
- Update MASTER_SITES and HOMEPAGE to current ones

Changes:
Version 1.4.10:
- Improved handling of temporary files on Windows systems.
- Re-enabled support for systems lacking vasprintf(), such as IBM i PASE.

Version 1.4.9:
- No significant changes.

Version 1.4.8:
- Added a new socket command and --socket option to connect via local sockets.
- Added a new tls_host_override command and --tls-host-override option to
  override the host name used for TLS verification.
- Fixed the source_ip command for proxies.

Version 1.4.7:
- Minor bug fixes.

Version 1.4.6:
- Minor bug fixes.

Version 1.4.5:
- Fixed OAUTHBEARER.
- Support for TLS client certificates via PKCS11 devices, e.g. smart cards.
- Various small bug fixes and improvements.

Version 1.4.4:
- Added support for the OAUTHBEARER authentication method.
- Several minor bug fixes.

Version 1.4.3:
- This version fixes a security problem that affects version 1.4.2 (older
  versions are not affected): when the new default value system for
  tls_trust_file is used, the result of certificate verification was not
  properly checked.

Version 1.4.2:
- To simplify TLS setup, the tls_trust_file command has a new default value
  'system' that selects the system default trust. Now you just need tls=on to
  use TLS; the other TLS options are only required in special cases.
  To make this work without breaking compatibility with older mpop versions,
  tls_fingerprint now overrides tls_trust_file, and tls_certcheck=off overrides
  both (previously, you could not specify contradicting options).
- To simplify setup, a new option '--configure <mailaddress>' was added that
  automatically generates a configuration file for a given mail address.
  However, this only works if the mail domain publishes appropriate SRV records.

Version 1.4.1:
- Fixed our TLS code to support TLS 1.3 with GnuTLS.

Version 1.4.0:
- Using OpenSSL is discouraged and may not be supported in the future. Please
  use GnuTLS instead. The reasons are explained here:
  https://marlam.de/mpop/news/openssl-discouraged/
- As using GNU SASL is most likely unnecessary, it is disabled by default now.
  Since everything uses TLS nowadays and thus can use PLAIN authentication, you
  really only need it for GSSAPI.
- If your system requires a library for IDN support, libidn2 is now used instead
  of the older libidn.
- The APOP and CRAM-MD5 authentication method are marked as obsolete / insecure
  and will not be chosen automatically anymore.
- The passwordeval command does not require the password to be terminated by a
  new line character anymore.
- Builtin default port numbers are now used instead of consulting /etc/services.
- Support for DJGPP and for systems lacking vasprintf(), mkstemp(), or tmpfile()
  is removed.

Version 1.2.8:
- Fix support for ~/.config/mpop/config as configuration file
- Add --source-ip option and source_ip command to bind the outgoing connection
  to a specific source IP address.
- Enable SNI for TLS

Version 1.2.7:
- Add support for ~/.config/mpop/config as configuration file
- Add network timeout handling on Windows
- Fix command line handling of SHA256 TLS fingerprints
- Update german translation


Discussed and ok with <reed>, thanks!
2020-06-18 20:50:26 +00:00
taca
6e31dc6e10 lang/rails60: update to 6.0.3.2
Update Ruby on Rails to 6.0.3.2.

www/ruby-actionpack60 is the really updated package and other packages
have no change except version.

CHANGELOG of www/ruby-actionpack60 is here:

## Rails 6.0.3.2 (June 17, 2020) ##

* [CVE-2020-8185] Only allow ActionableErrors if
  show_detailed_exceptions is enabled
2020-06-18 13:38:45 +00:00
nia
52cb390e86 thunderbird: Remove patches for NetBSD 7, rust dropped support for NetBSD 7 2020-06-17 18:00:09 +00:00