mutt: patch to workaround problem introduced in security fix; don't break

This commit is contained in:
sthen 2020-06-21 11:41:31 +00:00
parent 5fc0825abc
commit 08ed0b9a37
2 changed files with 27 additions and 1 deletions

View File

@ -1,9 +1,10 @@
# $OpenBSD: Makefile,v 1.135 2020/06/19 05:59:38 sthen Exp $
# $OpenBSD: Makefile,v 1.136 2020/06/21 11:41:31 sthen Exp $
COMMENT= tty-based e-mail client
DISTNAME= mutt-1.14.4
EPOCH= 3
REVISION= 0
CATEGORIES= mail
HOMEPAGE= http://www.mutt.org/

View File

@ -0,0 +1,25 @@
$OpenBSD: patch-imap_imap_c,v 1.2 2020/06/21 11:41:31 sthen Exp $
From dc909119b3433a84290f0095c0f43a23b98b3748 Mon Sep 17 00:00:00 2001
From: Kevin McCarthy <kevin@8t8.us>
Date: Sat, 20 Jun 2020 06:35:35 -0700
Subject: [PATCH] Don't check IMAP PREAUTH encryption if $tunnel is in use.
$tunnel is used to create an external encrypted connection. The
default of $ssl_starttls is yes, meaning those kinds of connections
will be broken by the CVE-2020-14093 fix.
Index: imap/imap.c
--- imap/imap.c.orig
+++ imap/imap.c
@@ -532,8 +532,8 @@ int imap_open_connection (IMAP_DATA* idata)
{
#if defined(USE_SSL)
/* An unencrypted PREAUTH response is most likely a MITM attack.
- * Require a confirmation. */
- if (!idata->conn->ssf)
+ * Require a confirmation unless using $tunnel. */
+ if (!idata->conn->ssf && !Tunnel)
{
if (option(OPTSSLFORCETLS) ||
(query_quadoption (OPT_SSLSTARTTLS,