Commit Graph

37 Commits

Author SHA1 Message Date
sthen
7a418f67c2 - bug-fix and SECURITY update to 1.5.20; fixes CVE-2009-1390 (X.509
Certificate Chain Security Bypass vulnerability).

- added a couple of post-1.5.20 patches from upstream for regressions

- cleanup the port's handling of sample config files

testing by Simon Kuhnle, Edd Barrett, testing and ok landry@.
2009-06-16 09:37:19 +00:00
sthen
075b497e2e update to 1.5.19 and take MAINTAINER. thanks to Simon Kuhnle,
landry@ and Brad for testing various versions of this diff.

ok landry@ after a few rounds of pain with Maildir and the sidebar
patch, eventually resulting in snapshot/patches/sidebar-buffy_c.
2009-04-20 07:43:21 +00:00
bernd
76ec27bad0 Some cleanup of the mutt Makefile's. Moving the common
WANTLIB stuff to Makefile.inc. Sorting the CONFIGURE_ARGS
options. Having the stable release of mutt use the appropriate
version of autoconf.

from brad@
2008-05-09 17:46:51 +00:00
sthen
df4efa83a9 Update Mutt to 1.5.17, fix WANTLIB for 1.5.xx (adding qdbm in 1.5.16
brought in a dependency on libz).

feedback/ok bernd@, simon@
2007-11-11 10:09:43 +00:00
merdely
8b76ad71d8 Remove surrounding quotes in COMMENT*/PERMIT_* 2007-09-16 00:17:04 +00:00
kili
c53c1f0ab8 Security update to 1.4.2.3.
Fixes an APOP authentication vulnerability (CVE-2007-1558).

ok bernd@
2007-06-15 19:01:07 +00:00
kili
b76042086c Fix buffer overflow in mutt_gecos_name().
From ray@ (snapshot), applied to stable and tested by me. Feedback
from wilfried@ and (via ray@) moritz@.

ok moritz@ steven@
2007-05-04 09:09:31 +00:00
bernd
909e1ec157 Update to mutt-1.5.12 snapshot.
tested by many
2006-08-02 14:30:09 +00:00
bernd
17da960e1d Minor update to mutt-1.4.2.2.
help & 'go ahead' steven@
2006-07-24 09:44:20 +00:00
bernd
da7e53023f Fix a buffer overflow in the IMAP code.
Diff from mutt CVS via TAKAHASHI Tamotsu, thanks!

ok naddy@
2006-06-21 08:16:45 +00:00
bernd
4dd9b2a726 Correct path to gpg in the gpg.rc example file. Bump PKGNAMEs.
ok sturm@
2006-03-22 12:43:09 +00:00
naddy
bfd5225608 Always explicitly set the AUTOCONF_VERSION to use. In some cases
the default was not appropriate.
2005-11-03 18:28:55 +00:00
bernd
890b25d060 - update mutt snapshot to 1.5.11
- move DISTNAME from Makefile.inc to stable/snapshot Makefile
(since 1.5.11, DISTNAME contains no 'i' anymore)

help & ok sturm@
2005-09-29 17:25:27 +00:00
bernd
7e88f71a34 - preprocess muttrc manpage with tbl(1)
- bump PKGNAME

ok fgsch@
2005-09-19 16:18:36 +00:00
fgsch
94af9f37ba fixes a crash when using limits reported by david@ and bump package. 2005-09-05 20:17:33 +00:00
fgsch
72486e8250 drop maintainership. 2005-06-30 05:24:53 +00:00
naddy
a6f85c1da0 push PKGNAME down one directory level; from sturm@ via maintainer 2005-02-07 20:47:56 +00:00
brad
92ff5d28b1 upgrade to mutt 1.4.2 2004-02-19 20:43:22 +00:00
jolan
488c8f48b9 missing depends on automake... 2004-02-16 02:39:10 +00:00
sturm
172da046e2 ups 2004-02-11 19:27:41 +00:00
sturm
1ed15a0bc6 SECURITY FIX
This patch fixes a buffer overflow that can be triggered by incoming messages.
There are reports about spam that has actually triggered this problem and
crashed mutt.

bumped PKGNAME

noticed by markus@
2004-02-11 19:19:47 +00:00
fgsch
19a7171e18 better. 2004-01-16 14:26:27 +00:00
fgsch
b8fdc0510d enable gss support and regen patches.
the former requested by Jan Johansson <janj+openbsd at wenf dot org>
2004-01-16 01:59:08 +00:00
sturm
9044ff3b89 - /etc -> SYSCONFDIR
- don't change SYSCONFDIR
2003-05-12 21:16:42 +00:00
lebel
4acbc63755 Mutt 1.4.1 and 1.5.4 were released on March 19, 2003. These releases both fix a
buffer overflow identified by Core Security Technologies. The only differences
between 1.4 and 1.4.1 are bug fixes. If you are currently using 1.4, it's
probably a very good idea to update.
2003-03-20 19:11:19 +00:00
fgsch
6b3ea10687 update MASTER_SITES.
from Nikolay Sturm <sturm at sec dot informatik dot tu-darmstadt dot de>
2002-12-24 13:09:34 +00:00
fgsch
6347e76401 byebye NEED_VERSION. 2002-10-05 21:11:09 +00:00
lebel
572e0f3314 really, naddy and I likes it better when SUPDISTFILES is
specified when the FLAVOR isn't compressed
2002-06-14 21:09:11 +00:00
fgsch
3deba4a6db update to mutt 1.4; submited also by lebel@. 2002-06-14 17:43:51 +00:00
fgsch
878d486621 Remove pop and imap flavors; suggested by naddy@, discussed with him
and lebel@.
2002-01-23 19:41:29 +00:00
naddy
914bd298a5 * add compressed folder patch to SUPDISTFILES
* whitespace fixes
ok fgsch@
2002-01-11 01:44:15 +00:00
fgsch
eb9f902af3 Minor cosmetical things to be closer to snapshot. 2002-01-08 05:25:12 +00:00
fgsch
a368cfa491 Put compressed flavor back now that a patch is available; reported
by lebel@lebel.org, thanks again.
2002-01-08 04:24:55 +00:00
fgsch
3471ed26f0 Disable compressed flavor by now; reported by lebel@lebel.org and
dorqus@bsdfreek.com.

This should make my 1000th commit.
2002-01-08 03:20:40 +00:00
fgsch
a0c0373d9c SECURITY FIX: Update to mutt 1.2.5.1. This fixes a remote exploit.
Reported by several ppl; thanks to them.
2002-01-02 22:05:42 +00:00
brad
f1cfae3e14 use gettext module. 2001-10-25 02:28:14 +00:00
lebel
0ab3ab7442 here is mutt/stable. This is of course the exact same port that used to
be in mail/mutt.  It is version 1.2.5.
2001-08-20 19:47:33 +00:00