Commit graph

11344 commits

Author SHA1 Message Date
jperkin
7d7b8ecc9d *: Explicitly pass -lintl on SunOS where required.
Recent libtool update appears to have exposed more of these.
2022-07-29 16:29:08 +00:00
taca
d27f5a6e49 mail/roundcube: update to 1.5.3
1.5.3 (2022-06-26)

* Enigma: Fix initial synchronization of private keys
* Enigma: Fix double quoted-printable encoding of pgp-signed messages with
  no attachments (#8413)
* Fix various PHP8 warnings (#8392)
* Fix mail headers injection via the subject field on mail compose (#8404)
* Fix bug where small message/rfc822 parts could not be decoded (#8408)
* Fix setting HTML mode on reply/forward of a signed message (#8405)
* Fix handling of RFC2231-encoded attachment names inside of a
  message/rfc822 part (#8418)
* Fix bug where some mail parts (images) could have not be listed as
  attachments (#8425)
* Fix bug where attachment icons were stuck at the top of the messages list
  in Safari (#8433)
* Fix handling of message/rfc822 parts that are small and are multipart
  structures with a single part (#8458)
* Fix bug where session could time out if DB and PHP timezone were different
  (#8303)
* Fix bug where DSN flag state wasn't stored with a draft (#8371)
* Fix broken encoding of HTML content encapsulated in a RTF attachment
  (#8444)
* Fix problem with aria-hidden=true on toolbar menus in the Elastic
  skin (#8517)
* Fix bug where title tag content was displayed in the body if it contained
  HTML tags (#8540)
* Fix support for DSN specification without host e.g. pgsql:///dbname
  (#8558)
2022-07-21 15:17:34 +00:00
taca
3a0fd72262 mail/postfix: update to 3.7.2
3.7.0 (2022-02-07)

  * Support to inline the content of small cidr:, pcre:, and regexp:
    tables in Postfix parameter values. An example is the new
    smtpd_forbidden_commands default value, "CONNECT GET POST
    regexp:{{/^[^A-Z]/ Thrash}}", to quickly drop connections from
    clients that send garbage.

  * To make the maillog_file feature more useful, including stdout
    logging from a container, the postlog(1) command is now set-gid
    postdrop, so that unprivileged programs can use it to write
    logging through the postlogd(8) daemon. This required hardening
    the postlog(1) command against privilege escalation attacks.

  * Support for library APIs: OpenSSL 3.0.0, PCRE2, Berkeley DB 18.

  * Postfix programs now randomize the initial state of in-memory
    hash tables, to defend against hash collision attacks involving
    a large number of attacker-chosen lookup keys. Presently, the
    only known opportunity for such attacks involves remote SMTP
    client IPv6 addresses in the anvil(8) service, and requires
    making hundreds of short-lived connections per second while
    cycling through thousands of different client IP addresses.

  * Updated defense against remote clients or servers that 'trickle'
    SMTP or LMTP traffic. This replaces the old per-record deadlines
    with per-request deadlines and minimum data rates.

  * Many typofixes by raf and Wietse.


3.7.1 (2022-04-18)

  * (problem introduced: Postfix 2.7) The milter_header_checks maps
    are now opened before the cleanup(8) server enters the chroot
    jail. Problem reported by Jesper Dybdal.

  * In an internal client module, "host or service not found" was
    a fatal error, causing the milter_default_action setting to be
    ignored. It is now a non-fatal error, just like a failure to
    connect. Problem reported by Christian Degenkolb.

  * The proxy_read_maps default value was missing up to 27 parameter
    names. The corresponding lookup tables were not automatically
    authorized for use with the proxymap(8) service. The parameter
    names were ending in _checks, _reply_footer, _reply_filter,
    _command_filter, and _delivery_status_filter.

  * (problem introduced: Postfix 3.0) With dynamic map loading
    enabled, an attempt to create a map with "postmap regexp:path"
    would result in a bogus error message "Is the postfix-regexp
    package installed?" instead of "unsupported map type for this
    operation". This happened with all non-dynamic map types (static,
    cidr, etc.) that have no 'bulk create' support. Problem reported
    by Greg Klanderman.

  * In PCRE_README, "pcre2 --libs" should be "pcre2 --libs8". Problem
    reported by Carlos Velasco.

  * Documented in the postlogd(8) daemon manpage that the Postfix
    >= 3.7 postlog(1) command can run with setgid permissions.

3.7.2 (2022-04-28)

This reverts an overly complex change in the postscreen SMTP engine
(made during Postfix 3.7 development), and replaces it with much
simpler code. The bad change was crashing postscreen on some systems
after receiving malformed input (for example, a TLS "hello" message).
2022-07-21 15:08:39 +00:00
jperkin
c03859708e mutt: Add lmdb header cache backend support.
Various benchmarks show this to be the best available option.
2022-07-21 10:12:36 +00:00
jperkin
a0f19a371f rspamd: Add missing PLIST update. 2022-07-21 09:10:12 +00:00
wiz
591f8bcba2 newspipe: use direct dependency 2022-07-20 23:04:36 +00:00
jperkin
3be7bfd0f5 rspamd: Update to 3.2.
3.2: 26 Mar 2022
  * [Conf] Score MIME_OBFUSCATED_ARCHIVE to 8 points
  * [Conf] Set one_shot for URIBL rules by default
  * [CritFix] Fix upstreams name resolution when there is also a port
  * [Feature] Add ROC feature to neural network plugin
  * [Feature] Add public suffic compilation utility
  * [Feature] Add support of Cloudmark
  * [Feature] Allow hyperscan for ppc64, as vectorscan now suports it.
  * [Feature] Allow to skip DNS resolution for keep-alive connections
  * [Feature] Aws_s3: Allow to store large parts separately
  * [Feature] BIMI: Add preliminary version of the BIMI plugin
  * [Feature] JSON endpoint for querying maps
  * [Feature] Lua_magic: Add a sane CSV heuristic
  * [Feature] Lua_mime: Add schema for message transfer
  * [Feature] Output average scan time in /stat endpoint
  * [Feature] Show average scan time in `rspamc stat` output
  * [Fix] Add guards to avoid race condition on TCP connection
  * [Fix] Allow spaces in DKIM key records
  * [Fix] Apply the similar fix to the url_reputation
  * [Fix] Avoid overwriting whitelisted_signers_map
  * [Fix] Backport PR from libucl
  * [Fix] Clear SSL errors
  * [Fix] ClickHouse cleanup of old partitions
  * [Fix] Do not double call error handler on ssl errors in the timeout path
  * [Fix] Do not forget to clear pointers on IOC reset
  * [Fix] External_relay: Remove useless check of the map value
  * [Fix] Find suspicious url encodings that could break url extraction
  * [Fix] Fix HTTP(s) client timeout
  * [Fix] Fix exclude flags setting
  * [Fix] Fix expanding of the variables
  * [Fix] Fix host header usage in lua_http
  * [Fix] Fix http maps shared memory cache cleanup
  * [Fix] Fix logic in HTML processing FSM
  * [Fix] Fix parsing of the compound mailto urls
  * [Fix] Fix processing captures from pcre2
  * [Fix] Fix removing from khash
  * [Fix] Fix stuctured headers pushing
  * [Fix] Further fix for i386 compilation
  * [Fix] Improve duplicate settings error reporting
  * [Fix] Lua: task:remove_result didn't work in some cases
  * [Fix] Output service parts as well
  * [Fix] Phishing: Deal with phishing + redirected URL
  * [Fix] Phishing: Fix finding domains in the phishing map
  * [Fix] Plug memory leak by using mempool for a copied address
  * [Fix] Properly find the request and the number of requested entries
  * [Fix] Rbl: Fix inversed logic of the url_full_hostname
  * [Fix] Read file maps if they were not pre-read during preload
  * [Fix] Restrict x86_64 assembly to x86_64
  * [Fix] Return a real number of recipients when dealing with aliases
  * [Fix] Rework unshedule DNS request function
  * [Fix] Support definition of ungrouped symbol in conf file, use group info from lua or other conf file
  * [Fix] Unschedule DNS request when clearing IO channel
  * [Fix] When checking for phishing, we need to convert punicode -> UTF8, not vice versa
  * [Fix] lua_cfg_transform - actions without score (discard)
  * [Fix] lua_cfg_transform - silly break break actions
  * [Fix] ratelimit - symbol per bucket
  * [Project] BIMI: Fix helper integration issues
  * [Project] Further DNS over TCP architecturing
  * [Project] Rdns: Add more functions for TCP based requests
  * [Project] Rdns: Add preliminary reading logic for TCP channels
  * [Project] Rdns: Add reaper for inactive TCP connections
  * [Project] Rdns: Add timeout logic for TCP requests
  * [Project] Rdns: Do not treat TCP channels failure as fatal
  * [Project] Rdns: Fix TCP connection mess
  * [Project] Rdns: Fix TCP stuff cleanup
  * [Project] Rdns: Fix various ownership issues
  * [Project] Rdns: Implement TCP writing logic
  * [Project] Rdns: Initial support of TCP IO channels
  * [Project] Rdns: More fixes in TCP handling
  * [Project] Rdns: Restore the previous EDNS0 size
  * [Project] Rdns: Send truncated replies via TCP
  * [Project] Rdns: Unregister TCP requests
  * [Rework] Allow to restore SSL handlers after keepalive pooling
  * [Rework] Allow to set a different behaviour for actions from settings
  * [Rework] Include SSL flag into keepalive hash
  * [Rework] Make `rspamadm dmarc_report` default behaviour more sane
  * [Rework] Mempool: Use explicit alignment
  * [Rework] Rdns: Use faster and more compact hash table for DNS requests
  * [Rework] Rework SSL flag operations
  * [Rework] Take disabled flag into account
  * [Rework] Timeouts are now global per event and not reseted by IO activity
  * [Rework] Use xxh3 as a default hash and fix memory/alignment issues
  * [Rules] Fix old rules to stop global functions usage
  * [Rules] Fix symbol for DKIM temporary failure
  * [Rules] Remove ancient and inefficient rules
  * [Rules] Slightly reduce MULTIPLE_FROM score
2022-07-20 15:55:04 +00:00
wiz
1b8e4d6567 *: bump for gsasl shlib major bump 2022-07-17 08:25:07 +00:00
triaxx
7e6463933b roundcube-plugin-carddav: Mark this package incompatible with PHP 5.6 2022-07-13 17:55:19 +00:00
bsiegert
58ed03696e Revbump all Go packages after go118 update 2022-07-13 16:02:57 +00:00
taca
e85cf8cfea www/ruby-rails70: update to 7.0.3.1
Rails 7.0.3.1 (2022-07-12) updates databases/ruby-activerecord70 only.

databases/ruby-activerecord70

* Change ActiveRecord::Coders::YAMLColumn default to safe_load

  This adds two new configuration options The configuration options are as
  follows:

	o config.active_storage.use_yaml_unsafe_load

  When set to true, this configuration option tells Rails to use the old
  "unsafe" YAML loading strategy, maintaining the existing behavior but
  leaving the possible escalation vulnerability in place.  Setting this
  option to true is *not* recommended, but can aid in upgrading.

	o config.active_record.yaml_column_permitted_classes

  The "safe YAML" loading method does not allow all classes to be
  deserialized by default.  This option allows you to specify classes deemed
  "safe" in your application.  For example, if your application uses Symbol
  and Time in serialized data, you can add Symbol and Time to the allowed
  list as follows:


	config.active_record.yaml_column_permitted_classes = [Symbol, Date, Time]


  [CVE-2022-32224]
2022-07-13 14:48:47 +00:00
taca
897ebaa12e www/ruby-rails61: update to 6.1.6.1
Rails 6.1.6.1 (2022-07-12) updates databases/ruby-activerecord61 only.

databases/ruby-activerecord61

* Change ActiveRecord::Coders::YAMLColumn default to safe_load

  This adds two new configuration options The configuration options are as
  follows:

	o config.active_storage.use_yaml_unsafe_load

  When set to true, this configuration option tells Rails to use the old
  "unsafe" YAML loading strategy, maintaining the existing behavior but
  leaving the possible escalation vulnerability in place.  Setting this
  option to true is *not* recommended, but can aid in upgrading.

	o config.active_record.yaml_column_permitted_classes

  The "safe YAML" loading method does not allow all classes to be
  deserialized by default.  This option allows you to specify classes deemed
  "safe" in your application.  For example, if your application uses Symbol
  and Time in serialized data, you can add Symbol and Time to the allowed
  list as follows:


	config.active_record.yaml_column_permitted_classes = [Symbol, Date, Time]


  [CVE-2022-32224]
2022-07-13 14:46:23 +00:00
taca
2230a22ae7 www/ruby-rails60: update to 6.0.5.1
Rails 6.0.5.1 (2022-07-12) updates databases/ruby-activerecord60 only.

databases/ruby-activerecord60

* Change ActiveRecord::Coders::YAMLColumn default to safe_load

  This adds two new configuration options The configuration options are as
  follows:

	o config.active_storage.use_yaml_unsafe_load

  When set to true, this configuration option tells Rails to use the old
  "unsafe" YAML loading strategy, maintaining the existing behavior but
  leaving the possible escalation vulnerability in place.  Setting this
  option to true is *not* recommended, but can aid in upgrading.

	o config.active_record.yaml_column_permitted_classes

  The "safe YAML" loading method does not allow all classes to be
  deserialized by default.  This option allows you to specify classes deemed
  "safe" in your application.  For example, if your application uses Symbol
  and Time in serialized data, you can add Symbol and Time to the allowed
  list as follows:


	config.active_record.yaml_column_permitted_classes = [Symbol, Date, Time]


  [CVE-2022-32224]
2022-07-13 14:44:08 +00:00
taca
0b86a1339d www/ruby-rails52: update to 5.2.8.1
Rails 5.2.8.1 (2022-07-12) updates databases/ruby-activerecord52 only.

databases/ruby-activerecord52

* Change ActiveRecord::Coders::YAMLColumn default to safe_load

  This adds two new configuration options The configuration options are as
  follows:

	o config.active_storage.use_yaml_unsafe_load

  When set to true, this configuration option tells Rails to use the old
  "unsafe" YAML loading strategy, maintaining the existing behavior but
  leaving the possible escalation vulnerability in place.  Setting this
  option to true is *not* recommended, but can aid in upgrading.

	o config.active_record.yaml_column_permitted_classes

  The "safe YAML" loading method does not allow all classes to be
  deserialized by default.  This option allows you to specify classes deemed
  "safe" in your application.  For example, if your application uses Symbol
  and Time in serialized data, you can add Symbol and Time to the allowed
  list as follows:


	config.active_record.yaml_column_permitted_classes = [Symbol, Date, Time]


  [CVE-2022-32224]
2022-07-13 14:41:07 +00:00
abs
b2f95a07cd Fix exim build on NetBSD (support for bdb 1.x dropped)
Bump PKGREVISION
2022-07-11 10:52:29 +00:00
triaxx
7c3e3074f7 commit.msg 2022-07-11 09:59:06 +00:00
wiz
368f89bdc9 notmuch: restrict to python 3 2022-07-08 22:12:53 +00:00
ryoon
3f802fe5c3 *: Recursive revbump from audio/pulseaudio 2022-07-02 16:53:03 +00:00
taca
38bd98556c mail/opendmarc: fix DISTNAME
Use PKGNAME_NOREV instead of PKGNAME for DISTNAME.
2022-07-02 13:02:32 +00:00
adam
787faefc2e exim exim-html: updated to 4.96
New stuff we've added since 4.95:

  - A new ACL condition: seen. Records/tests a timestamp against a key.
  - A variant of the "mask" expansion operator to give normalised IPv6.
  - UTC output option for exim_dumpdb, exim_fixdb.
  - An event for failing TLS connects to the daemon.
  - The ACL "debug" control gains options "stop", "pretrigger" and "trigger".
  - Query-style lookups are now checked for quoting, if the query string is
     built using untrusted data ("tainted").  For now lack of quoting is merely
     logged; a future release will upgrade this to an error.
  - The expansion conditions match_<list-type> and inlist now set $value for
     the expansion of the "true" result of the ${if}.  With a static list, this
     can be used for de-tainting.

Notable removals since 4.95:

   - the "allow_insecure_tainted_data" main config option and the
     "taint" log_selector.  These were deprecated in the 4.95 release.
2022-07-02 09:24:34 +00:00
hauke
2b458223a6 Update mail/milter-greylist to v4.6.4.
This unbreaks the build, and should probably be pulled up.
2022-06-30 14:52:07 +00:00
nia
04f4eef997 *: Revbump packages that use Python at runtime without a PKGNAME prefix 2022-06-30 11:18:01 +00:00
wiz
8292204475 *: recursive bump for perl 5.36 2022-06-28 11:30:51 +00:00
adam
b5ff303e32 dovecot2: updated to 2.3.19.1
2.3.19.1
- doveadm deduplicate: Non-duplicate mails were deleted. v2.3.19 regression.
- auth: Crash would occur when iterating multiple backends.
  Fixes: Panic: file userdb-blocking.c: line 125 (userdb_blocking_iter_next): assertion failed: (ctx->conn != NULL)
2022-06-17 17:32:41 +00:00
bsiegert
9cafd665d8 postfix: FreeBSD 13 support
makedefs already contains the FreeBSD 12 stanza but not version 13.
From cubadevelop via Github Pull Request.

Fixes NetBSD/pkgsrc#97
2022-06-11 10:27:04 +00:00
wiz
9d833d2995 deforaos-mailer: depend on latest gtk-doc and fix PLIST for it
Bump PKGREVISION.
2022-06-09 07:48:47 +00:00
taca
0b6f221ede mail/ruby-actionmailbox70: update to 7.0.3
7.0.3 (2022-05-12)

* No change except version.
2022-06-07 15:21:08 +00:00
taca
befb4b8160 mail/ruby-actionmailer70: update to 7.0.3
7.0.3 (2022-05-12)

* No change except version.
2022-06-07 15:20:42 +00:00
taca
1cbe37c463 www/ruby-rails61: update to 6.1.6
Ruby on Rails 6.1.6 (2022-05-12)

Active Support

* Fix and add protections for XSS in ActionView::Helpers and ERB::Util.

  Add the method ERB::Util.xml_name_escape to escape dangerous characters in
  names of tags and names of attributes, following the specification of XML.


Action View

* Fix and add protections for XSS in ActionView::Helpers and ERB::Util.

  Escape dangerous characters in names of tags and names of attributes in
  the tag helpers, following the XML specification. Rename the option
  :escape_attributes to :escape, to simplify by applying the option to the
  whole tag.


Action Pack

* Allow Content Security Policy DSL to generate for API responses.
2022-06-07 15:05:21 +00:00
taca
10f0cf1425 www/ruby-rails60: update to 6.0.5
Ruby on Rails 6.0.5 (2022-05-12)

Active Support

* Fix tag helper regression.

Action Text

* Disentangle Action Text from ApplicationController

  Allow Action Text to be used without having an ApplicationController
  defined.

  This makes sure:

    - Action Text attachments render the correct URL host in mailers.
    - an ActionController::Renderer isn't allocated per request.
    - Sidekiq doesn't hang with the "classic" autoloader.
2022-06-07 14:59:20 +00:00
taca
1b4bda9fd4 www/ruby-rails52: update to 5.2.8
Ruby on Rails 5.2.8 (2022-05-12)

Active Support

* Fix tag helper regression.

Action View

* Make `LoadInterlockAwareMonitor` work in Ruby 2.7.
* Retain Ruby 2.2 compatibility.
2022-06-07 14:48:11 +00:00
tron
04e9866001 mutt: Update to version 2.2.6
This is a bug-fix release, fixing a variety of small issues.
2022-06-06 20:58:33 +00:00
mef
721daae997 (mail/vm,wl,wl-snapshot) buildlink3.mk to bbdb2 just renamed 2022-06-05 02:36:41 +00:00
bsiegert
d97b2d854f Revbump all Go packages after go118 update 2022-06-02 18:51:56 +00:00
leot
493e293082 fdm: Update to 2.1
pkgsrc changes:
 - Remove OAUTHBEARER patches for IMAP, part of 2.1 release

Changes:
2.1
---
 - Add support for LMTP
 - Add support for XOAUTH2 for IMAP
 - Add support for OAUTHBEARER for IMAP
 - Several bug fixes and improvements
2022-06-01 21:07:29 +00:00
gavan
952e890ae7 cyrus-imap24: Another compilation fix 2022-05-29 19:53:59 +00:00
gavan
445944d697 cyrus-imapd24: Remove extraneous newline from previous commit 2022-05-29 19:47:20 +00:00
gavan
b00d05447d cyrus-imapd24: Compilation fixes 2022-05-29 19:44:05 +00:00
gavan
7fe48ed0f6 Fix compilation on 32-bit x86 systems
These patches are from:
f6dc828c3d
6f4cbc261b
2022-05-29 19:21:46 +00:00
wen
3a889eba1b Update to 2.21
Upstream changes:
2.21 2022/05/09
    + version bump, update Changes

2.20 2022/05/04
    + UTF8 support (from eady@gal...)
2022-05-28 07:19:37 +00:00
wen
b29caf43b9 Update to 3.012
Upstream changes:
version 3.012: Fri 11 Feb 11:34:31 CET 2022

        Fixes:
        - ::Field::Attributes should be stored case intensively
         rt.cpan.org#140894 [Yanyan Yang]
        - ::Field::Full phrase with encoding qp parsing failed when
          the qp contains non-atext characters. Github#2 [Andy Beverley]
        - ::Field::Full QP encoding must be more strict for use in
          MIME headers.  Github#3 [Andy Beverley]
        - Coercion from Mail::Address to Mail::Message::Full::Address
          is too lazy.  Github#4 [Andy Beverley]

        Improvements:
        - extend date in mbox-separator to accept 203X as well.
2022-05-28 07:16:43 +00:00
wen
5be7c1c146 Update to 1.20220520
Upstream changes:
1.20220520 2022-05-20 UTC
  + Change default algorithm in dkimsign.pl to sha-256
  + Use Getopt::Long::Descriptive in scripts for better command help

1.20220408 2022-04-08 UTC
  + Add support for signatures with an Expiration value
2022-05-28 07:03:37 +00:00
triaxx
ce75a4c64e fetchmailconf: Update to 6.4.30
upstream changes:
-----------------
See changes of mail/fetchmail
2022-05-26 06:18:51 +00:00
triaxx
b5650affe9 fetchmail: Update to 6.4.30
upstream changes:
-----------------
fetchmail-6.4.30 (released 2022-04-26, 31666 LoC):

# BREAKING CHANGES:
* Bump wolfSSL minimum required version to 5.2.0 to pull in security fix.

# CHANGES:
* Using OpenSSL 1.* before 1.1.1n elicits a compile-time warning.
* Using OpenSSL 3.* before 3.0.2  elicits a compile-time warning.
* configure.ac was tweaked in order to hopefully fix cross-compilation issues
  report, and different patch suggested, by Fabrice Fontaine,
  https://gitlab.com/fetchmail/fetchmail/-/merge_requests/42

# TRANSLATIONS: language translations were updated by this fine person:
* ro:    Remus-Gabriel Chelu [Romanian]

--------------------------------------------------------------------------------
fetchmail-6.4.29 (released 2022-03-20, 31661 LoC):

# TRANSLATIONS: language translations were updated by this fine person:
* vi:    Trần Ngọc Quân [Vietnamese]

--------------------------------------------------------------------------------
fetchmail-6.4.28 (released 2022-03-05, 31661 LoC):

# DOCUMENTATION:
* Fix a typo in the manual page, courtesy of Jeremy Petch.

# TRANSLATIONS: language translations were updated by this fine person:
* es:    Cristian Othón Martínez Vera [Spanish]
2022-05-26 06:18:23 +00:00
manu
a48a4d7668 Added mail/srs-milter 20141121nb9
This milter implemets SRS (Sender Rewriting Scheme) that can be used to
fix envelope MAIL FROM for forwarded mails protected by SPF. It can be
configured in two modes for:

* Incoming mail -- rewrite RCPT TO addresses in SRS format back
* Outgoing mail -- rewrite MAIL FROM address to SRS format
2022-05-25 15:45:31 +00:00
dholland
578175f9d1 mail/distribute: while here, patch some build warnings 2022-05-23 03:55:50 +00:00
dholland
4b34359539 PR 28609 Georg Schwarz mail/distribute doesn't build on Irix
- Set STRSEP_MISSING on Irix.
 - Remove patch-ab, which #if'd out a fallback definition for
   _PATH_SENDMAIL; that's completely pointless.
2022-05-23 03:45:35 +00:00
rillig
6ac48da9c9 elm-me: fix pkglint warnings 2022-05-21 21:41:09 +00:00
taca
a85101c100 mail/php-mailparse: update to 3.1.3
3.1.2 (2021-09-01)

* Fix for PHP 8.1


3.1.3 (Fix for PHP 8.1)

* Fix #73110: Mails with unknown MIME version are treated as
  plain/text. (cmb)

* Fix #74233: Parsing multi Content-Disposition causes memory leak. (cmb)

* Fix #75825: mailparse_uudecode_all doesn't parse multiple files. (cmb)

* Fix #81422: Potential double-free in mailparse_uudecode_all(). (cmb)

* Fix gh#19 Segmentation fault with PHP 8.1 in extract_body using
  MAILPARSE_EXTRACT_RETURN. (Remi)
2022-05-21 09:19:10 +00:00
tron
175dc23563 mutt: Update to version 2.2.5
This is a bug-fix release, fixing two authentication problems when Mutt is
configured with libgsasl (a new configuration option in 2.2.x).
2022-05-16 22:45:29 +00:00