sthen
7a418f67c2
- bug-fix and SECURITY update to 1.5.20; fixes CVE-2009-1390 (X.509
...
Certificate Chain Security Bypass vulnerability).
- added a couple of post-1.5.20 patches from upstream for regressions
- cleanup the port's handling of sample config files
testing by Simon Kuhnle, Edd Barrett, testing and ok landry@.
2009-06-16 09:37:19 +00:00
sthen
075b497e2e
update to 1.5.19 and take MAINTAINER. thanks to Simon Kuhnle,
...
landry@ and Brad for testing various versions of this diff.
ok landry@ after a few rounds of pain with Maildir and the sidebar
patch, eventually resulting in snapshot/patches/sidebar-buffy_c.
2009-04-20 07:43:21 +00:00
bernd
76ec27bad0
Some cleanup of the mutt Makefile's. Moving the common
...
WANTLIB stuff to Makefile.inc. Sorting the CONFIGURE_ARGS
options. Having the stable release of mutt use the appropriate
version of autoconf.
from brad@
2008-05-09 17:46:51 +00:00
sthen
df4efa83a9
Update Mutt to 1.5.17, fix WANTLIB for 1.5.xx (adding qdbm in 1.5.16
...
brought in a dependency on libz).
feedback/ok bernd@, simon@
2007-11-11 10:09:43 +00:00
merdely
8b76ad71d8
Remove surrounding quotes in COMMENT*/PERMIT_*
2007-09-16 00:17:04 +00:00
kili
c53c1f0ab8
Security update to 1.4.2.3.
...
Fixes an APOP authentication vulnerability (CVE-2007-1558).
ok bernd@
2007-06-15 19:01:07 +00:00
kili
b76042086c
Fix buffer overflow in mutt_gecos_name().
...
From ray@ (snapshot), applied to stable and tested by me. Feedback
from wilfried@ and (via ray@) moritz@.
ok moritz@ steven@
2007-05-04 09:09:31 +00:00
bernd
909e1ec157
Update to mutt-1.5.12 snapshot.
...
tested by many
2006-08-02 14:30:09 +00:00
bernd
17da960e1d
Minor update to mutt-1.4.2.2.
...
help & 'go ahead' steven@
2006-07-24 09:44:20 +00:00
bernd
da7e53023f
Fix a buffer overflow in the IMAP code.
...
Diff from mutt CVS via TAKAHASHI Tamotsu, thanks!
ok naddy@
2006-06-21 08:16:45 +00:00
bernd
4dd9b2a726
Correct path to gpg in the gpg.rc example file. Bump PKGNAMEs.
...
ok sturm@
2006-03-22 12:43:09 +00:00
naddy
bfd5225608
Always explicitly set the AUTOCONF_VERSION to use. In some cases
...
the default was not appropriate.
2005-11-03 18:28:55 +00:00
bernd
890b25d060
- update mutt snapshot to 1.5.11
...
- move DISTNAME from Makefile.inc to stable/snapshot Makefile
(since 1.5.11, DISTNAME contains no 'i' anymore)
help & ok sturm@
2005-09-29 17:25:27 +00:00
bernd
7e88f71a34
- preprocess muttrc manpage with tbl(1)
...
- bump PKGNAME
ok fgsch@
2005-09-19 16:18:36 +00:00
fgsch
94af9f37ba
fixes a crash when using limits reported by david@ and bump package.
2005-09-05 20:17:33 +00:00
fgsch
72486e8250
drop maintainership.
2005-06-30 05:24:53 +00:00
naddy
a6f85c1da0
push PKGNAME down one directory level; from sturm@ via maintainer
2005-02-07 20:47:56 +00:00
brad
92ff5d28b1
upgrade to mutt 1.4.2
2004-02-19 20:43:22 +00:00
jolan
488c8f48b9
missing depends on automake...
2004-02-16 02:39:10 +00:00
sturm
172da046e2
ups
2004-02-11 19:27:41 +00:00
sturm
1ed15a0bc6
SECURITY FIX
...
This patch fixes a buffer overflow that can be triggered by incoming messages.
There are reports about spam that has actually triggered this problem and
crashed mutt.
bumped PKGNAME
noticed by markus@
2004-02-11 19:19:47 +00:00
fgsch
19a7171e18
better.
2004-01-16 14:26:27 +00:00
fgsch
b8fdc0510d
enable gss support and regen patches.
...
the former requested by Jan Johansson <janj+openbsd at wenf dot org>
2004-01-16 01:59:08 +00:00
sturm
9044ff3b89
- /etc -> SYSCONFDIR
...
- don't change SYSCONFDIR
2003-05-12 21:16:42 +00:00
lebel
4acbc63755
Mutt 1.4.1 and 1.5.4 were released on March 19, 2003. These releases both fix a
...
buffer overflow identified by Core Security Technologies. The only differences
between 1.4 and 1.4.1 are bug fixes. If you are currently using 1.4, it's
probably a very good idea to update.
2003-03-20 19:11:19 +00:00
fgsch
6b3ea10687
update MASTER_SITES.
...
from Nikolay Sturm <sturm at sec dot informatik dot tu-darmstadt dot de>
2002-12-24 13:09:34 +00:00
fgsch
6347e76401
byebye NEED_VERSION.
2002-10-05 21:11:09 +00:00
lebel
572e0f3314
really, naddy and I likes it better when SUPDISTFILES is
...
specified when the FLAVOR isn't compressed
2002-06-14 21:09:11 +00:00
fgsch
3deba4a6db
update to mutt 1.4; submited also by lebel@.
2002-06-14 17:43:51 +00:00
fgsch
878d486621
Remove pop and imap flavors; suggested by naddy@, discussed with him
...
and lebel@.
2002-01-23 19:41:29 +00:00
naddy
914bd298a5
* add compressed folder patch to SUPDISTFILES
...
* whitespace fixes
ok fgsch@
2002-01-11 01:44:15 +00:00
fgsch
eb9f902af3
Minor cosmetical things to be closer to snapshot.
2002-01-08 05:25:12 +00:00
fgsch
a368cfa491
Put compressed flavor back now that a patch is available; reported
...
by lebel@lebel.org , thanks again.
2002-01-08 04:24:55 +00:00
fgsch
3471ed26f0
Disable compressed flavor by now; reported by lebel@lebel.org and
...
dorqus@bsdfreek.com .
This should make my 1000th commit.
2002-01-08 03:20:40 +00:00
fgsch
a0c0373d9c
SECURITY FIX: Update to mutt 1.2.5.1. This fixes a remote exploit.
...
Reported by several ppl; thanks to them.
2002-01-02 22:05:42 +00:00
brad
f1cfae3e14
use gettext module.
2001-10-25 02:28:14 +00:00
lebel
0ab3ab7442
here is mutt/stable. This is of course the exact same port that used to
...
be in mail/mutt. It is version 1.2.5.
2001-08-20 19:47:33 +00:00