Changelog: 1.5.4: 2010-09-13 23:59 UTC Critical Security release. It is highly recommended that users of 1.5.3 upgrade to this release, a change in the boundary detection code introduced a potential denial of service attack. Bug Fixes #17862 - quote boundary preg_split code 1.5.3: 2010-09-05 09:26 UTC Major Bugfix release. Apart from a major cleanout of the bug tracker for this package, this release includes a revamped parseHeaderValue which removes the rather flakey regex, with a real parser, which should be considerably more robust. Bug Fixes #17844 - all regression tests fixed - remove the last of the while list each() .. this is 2010 ;)... #11410 - support wap multipart #9616 - long strings as filename etc.. aaa*0=.... aaa*1=.... aaa*2=.... (merged into aaa=.....) #9100 - change to preg_split for mime boundary detection , in theory should catch boundaries in nested situations better... #7709 - check for last element on boundary split to see if its usable #7065 - wrapped header lines with encoding should be concated without spaces #6495 - missing body in decoded object #11537 - better decode and multi-line support 1.5.2: 2010-09-02 12:01 UTC Bug Fixes #4739 - regexp parsing of header values does not balance quoting correctly - Fix sponsored by http://webyog.com #17325 - empty body messages are valid messages #17276 - remove &new usage which throws errors now
5 lines
272 B
Text
5 lines
272 B
Text
$NetBSD: distinfo,v 1.2 2010/09/23 08:08:56 taca Exp $
|
|
|
|
SHA1 (pear/Mail_mimeDecode-1.5.4.tgz) = a3ab2dfb2ab9ccc026ded8cf28abcad68ec2f9f0
|
|
RMD160 (pear/Mail_mimeDecode-1.5.4.tgz) = 74ef296740f4283e53ce7803de2771d2b513bfd6
|
|
Size (pear/Mail_mimeDecode-1.5.4.tgz) = 11380 bytes
|