42 Commits

Author SHA1 Message Date
sthen
555c0d8a8c update to fetchmail-6.4.22 2021-10-21 20:52:53 +00:00
sthen
441a78afd4 update to fetchmail-6.4.21 2021-08-09 19:20:26 +00:00
sthen
6ca653e2e4 update to fetchmail-6.4.20 2021-07-29 10:44:07 +00:00
sthen
6cd35da717 update to fetchmail-6.4.13. 2021-03-28 13:32:50 +00:00
tb
d879c7e6af update fetchmail to 6.4.12
Not much changed, it gained translations for Romanian and Serbian,
documentation fixes and saw some package config churn to make sure
FreeBSD links against the correct libssl.

ok kn
2020-09-13 19:01:23 +00:00
sthen
efab8587a8 update to fetchmail-6.4.6 2020-06-12 13:02:35 +00:00
sthen
0468f9e1b7 update to fetchmail-6.4.3 2020-04-15 19:48:39 +00:00
sthen
894d97f328 update to fetchmail-6.4.2 2020-02-15 15:55:51 +00:00
sthen
00b10cf194 update to fetchmail-6.4.1 2020-01-27 13:48:45 +00:00
jasper
08dd19bb58 update to fetchmail-6.3.26 2014-06-21 07:58:28 +00:00
sthen
e12fe2008d update to fetchmail 6.3.24 2013-01-14 01:42:24 +00:00
jasper
3e45ae7413 - update fetchmail to 6.3.21, includes a critical fix for imap/maildir users 2011-08-21 16:41:30 +00:00
sthen
02c6211f1a update fetchmail to 6.3.20, tested by jasper@, lots of fixes including:
* CVE-2011-1947
- use timeouts for IMAP STARTTLS/POP3 STLS negotiation which could cause
  fetchmail freezes if a server was hanging.
* security improvements to defang X.509 certificate abuse
- require wildcard CN/subject alternative names to start with "*." not just "*"
- don't allow wildcards to match domain literals (such as 10.9.8.7) or
  wildcards in domain literals ("*.168.23.23").
- don't allow wildcarding top-level domains.
2011-06-06 13:57:07 +00:00
giovanni
09a7c52666 Update to 6.3.17
ok kili@
2010-05-19 15:27:18 +00:00
jasper
168efadf72 - update fetchmail to 6.3.15
from charles smith, thanks.
2010-03-31 19:12:06 +00:00
sthen
3927255cfd security update to 6.3.14, heap overflow in verbose mode SSL cert display
on signed char arch. http://www.fetchmail.info/fetchmail-SA-2010-01.txt

"This might be exploitable to inject code if
- - fetchmail is run in verbose mode
AND
- - the host running fetchmail considers char signed
AND
- - the server uses malicious certificates with non-printing characters
  that have the high bit set
AND
- - these certificates manage to inject shell-code that consists purely of
  printable characters.

It is believed to be difficult to achieve all this."
2010-03-22 01:28:40 +00:00
sthen
706b5d1ee3 update to 6.3.13, fixing a regression introduced in 6.3.12. ok jasper@ 2009-11-02 19:47:49 +00:00
sthen
4ab60c1904 SECURITY update to 6.3.12, fixes CVE-2009-2666 (bad handling of nulls
in SSL domain names).  ok jasper@
2009-10-11 20:52:17 +00:00
jasper
5141823be7 - update fetchmail to 6.3.9
ok sthen@
2009-02-17 12:08:44 +00:00
bernd
573299d695 Security update to fetchmail-6.3.8. (CVE-2007-1558)
Make the APOP challenge parser more distrustful and have it reject challenges
that do not conform to RFC-822 msg-id format, in the hope to make mounting
man-in-the-middle attacks (MITM) against APOP a bit more difficult.

Detailed information:
http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt
2007-04-13 13:22:25 +00:00
espie
9eafbbfb35 base64 checksums. 2007-04-05 16:19:55 +00:00
bernd
60d27b1449 Security update to fetchmail-6.3.6:
A password disclosure vulnerability (CVE-2006-5867, fetchmail's using unsafe
logins or omitting TLS) and a denial of service vulnerability (CVE-2006-5974,
fetchmail crashes, dereferencing the null page, when rejecting a message sent
to an MDA).

Fetchmail 6.3.6 also fixes several regressions and long-standing bugs.

Details:
https://lists.berlios.de/pipermail/fetchmail-announce/2007-January/000042.html

tests & ok jasper@, simon@
2007-01-09 10:35:42 +00:00
bernd
c4c1542325 Update to fetchmail-6.3.4. 2006-04-21 09:21:59 +00:00
bernd
4be38c5eef Update to fetchmail-6.3.3. 2006-04-01 11:57:44 +00:00
bernd
b0caefa3d0 Update to fetchmail-6.3.2.
This update includes security fixes for CVE-2005-2335, CVE-2005-4348
and CVE-2006-0321.

Take over maintainership. (With permission from old MAINTAINER fgsch@.)

Tested by Sigfred Håversen and aanriot@.

ok aanriot@, brad@
2006-01-31 14:30:34 +00:00
fgsch
6c8c34dfa8 SECURITY FIX: update to 6.2.5.2, see
http://www.vuxml.org/openbsd/aee27100-fcf2-11d9-b3c7-00065bd5b0b6.html.
Update master sites and homepage (project moved to belios.de).
From Bernd Ahlers <b dot ahlers at ba-net dot org>.
2005-07-25 17:41:51 +00:00
naddy
a8817eabcc SIZE 2005-01-05 16:50:35 +00:00
fgsch
55f346b834 update to 6.2.5. 2003-10-15 23:08:49 +00:00
fgsch
b6cf2a59ca update to fetchmail 6.2.4; bugfix release. 2003-08-13 23:28:24 +00:00
fgsch
ebaf3d2b0e update to fetchmail 6.2.3. 2003-07-17 22:36:44 +00:00
fgsch
64e49b97ce update to fetchmail 6.2.2. 2003-04-04 04:34:18 +00:00
fgsch
6e98edec2f SECURITY FIX: update to fetchmail 6.2.0. 2002-12-13 08:53:56 +00:00
fgsch
4d772574be Update to fetchmail 6.1.3. 2002-11-28 16:34:15 +00:00
fgsch
4d01b9259a update to fetchmail 6.1.2. 2002-11-02 20:23:34 +00:00
fgsch
33def50a65 update to fetchmail 6.1.1. 2002-10-18 20:31:21 +00:00
brad
6260e312ef upgrade to fetchmail 6.1.0
- fixes a few buffer overflows and a broken boundary check
which could potentially lead to a remote vulnerability.

http://marc.theaimsgroup.com/?l=bugtraq&m=103340148625187&w=2
--
Ok'd by: pvalchev@
2002-09-30 16:37:14 +00:00
fgsch
1ca6914e06 update to 6.0.0. 2002-09-18 01:02:51 +00:00
fgsch
80f4e233fe - update to fetchmail 5.9.14.
- remove deprecated NEED_VERSION.
- enable NTLM support as requested by Nick Nauwelaerts <nick@wanadoo.be>.
- add gettext to MODULES.
2002-09-10 10:14:24 +00:00
fgsch
7c5b7bb680 update to 5.9.13; see http://www.tuxedo.org/~esr/fetchmail/NEWS for changes. 2002-06-26 22:14:48 +00:00
fgsch
c3d0381acf update to fetchmail 5.9.12; for my chani. 2002-06-06 00:56:48 +00:00
fgsch
42eb883073 o Update to fetchmail 5.9.11.
o bump need_version.
o remove the need for autoconf.
2002-05-01 22:19:36 +00:00
fgsch
27e8a3e34a o update to fetchmail 5.9.6
o regenerate checksum files.
2001-12-17 21:45:49 +00:00