mutt: patch to workaround problem introduced in security fix; don't break
This commit is contained in:
parent
5fc0825abc
commit
08ed0b9a37
@ -1,9 +1,10 @@
|
|||||||
# $OpenBSD: Makefile,v 1.135 2020/06/19 05:59:38 sthen Exp $
|
# $OpenBSD: Makefile,v 1.136 2020/06/21 11:41:31 sthen Exp $
|
||||||
|
|
||||||
COMMENT= tty-based e-mail client
|
COMMENT= tty-based e-mail client
|
||||||
|
|
||||||
DISTNAME= mutt-1.14.4
|
DISTNAME= mutt-1.14.4
|
||||||
EPOCH= 3
|
EPOCH= 3
|
||||||
|
REVISION= 0
|
||||||
|
|
||||||
CATEGORIES= mail
|
CATEGORIES= mail
|
||||||
HOMEPAGE= http://www.mutt.org/
|
HOMEPAGE= http://www.mutt.org/
|
||||||
|
25
mail/mutt/patches/patch-imap_imap_c
Normal file
25
mail/mutt/patches/patch-imap_imap_c
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
$OpenBSD: patch-imap_imap_c,v 1.2 2020/06/21 11:41:31 sthen Exp $
|
||||||
|
|
||||||
|
From dc909119b3433a84290f0095c0f43a23b98b3748 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Kevin McCarthy <kevin@8t8.us>
|
||||||
|
Date: Sat, 20 Jun 2020 06:35:35 -0700
|
||||||
|
Subject: [PATCH] Don't check IMAP PREAUTH encryption if $tunnel is in use.
|
||||||
|
|
||||||
|
$tunnel is used to create an external encrypted connection. The
|
||||||
|
default of $ssl_starttls is yes, meaning those kinds of connections
|
||||||
|
will be broken by the CVE-2020-14093 fix.
|
||||||
|
|
||||||
|
Index: imap/imap.c
|
||||||
|
--- imap/imap.c.orig
|
||||||
|
+++ imap/imap.c
|
||||||
|
@@ -532,8 +532,8 @@ int imap_open_connection (IMAP_DATA* idata)
|
||||||
|
{
|
||||||
|
#if defined(USE_SSL)
|
||||||
|
/* An unencrypted PREAUTH response is most likely a MITM attack.
|
||||||
|
- * Require a confirmation. */
|
||||||
|
- if (!idata->conn->ssf)
|
||||||
|
+ * Require a confirmation unless using $tunnel. */
|
||||||
|
+ if (!idata->conn->ssf && !Tunnel)
|
||||||
|
{
|
||||||
|
if (option(OPTSSLFORCETLS) ||
|
||||||
|
(query_quadoption (OPT_SSLSTARTTLS,
|
Loading…
x
Reference in New Issue
Block a user