350 Commits

Author SHA1 Message Date
sthen
1a1d47d6de update to mutt-2.2.9 2022-11-13 11:07:42 +00:00
sthen
e9ec5227df update to mutt-2.2.8 2022-11-07 09:56:06 +00:00
sthen
45b6d0c955 update to mutt-2.2.7 2022-08-08 07:49:41 +00:00
sthen
bf60f4c6f4 build mutt with --enable-debug (to allow logging debug messages to
.muttdebugX files) by default rather than making it a special flavour.
2022-06-07 14:25:52 +00:00
sthen
e1302a6a07 update to mutt-2.2.6 2022-06-06 08:12:07 +00:00
sthen
74dfb1c4ec update to mutt-2.2.5 2022-05-16 22:39:25 +00:00
sthen
7e8505ad2d update to mutt-2.2.4 2022-05-01 08:51:45 +00:00
sthen
24d300b2b9 update to mutt-2.2.3
This is a bug-fix release, addressing CVE-2022-1328: a buffer overread in the
uuencoded decoder routine.  For more details please see GitLab ticket 404:
https://gitlab.com/muttmua/mutt/-/issues/404.  The commit fixing this issue
is at e5ed080c00

Also fixed were a possible integer overflow issue in the general iconv and
rfc2047-conversion iconv functions.  These are not believed to be exploitable.
2022-04-12 20:35:21 +00:00
sthen
7b93da54b4 update to mutt-2.2.2 2022-03-26 11:55:14 +00:00
sthen
a98e0e6666 remove rcs IDs in ports that I maintain 2022-03-07 21:36:41 +00:00
sthen
87cb2625aa update to mutt-2.2.1 2022-02-20 18:01:21 +00:00
sthen
63f2e9470b update to mutt-2.2.0 2022-02-13 13:07:36 +00:00
sthen
cf5301430f update to mutt-2.1.5 2021-12-31 09:58:11 +00:00
sthen
034b79dcd7 update to mutt-2.1.4v3 2021-12-12 13:04:43 +00:00
sthen
d5ac4c5858 update to mutt-2.1.3
as with the previous update, IMAP users and especially QRESYNC users are
advisted to upgrade.
2021-09-10 21:45:44 +00:00
sthen
3896bc5094 update to mutt-2.1.2, including an important fix for IMAP+header cache users
which I will backport to -stable. the relevant bug was introduced in 1.9.0.

"When there is a hole in the header cache, the UID numbers are no
longer guaranteed to increase with the index.  This can result in
incorrect msgset values being sent to the server."
2021-08-25 11:59:57 +00:00
sthen
9ddfa8b937 update to mutt-2.1.1 2021-07-13 08:43:49 +00:00
sthen
b620ac5633 update to mutt-2.1.0 2021-06-13 21:04:46 +00:00
sthen
8c2db117fe update to mutt-2.0.7 2021-05-04 21:35:41 +00:00
sthen
8445bb8ac5 update to mutt-2.0.6 2021-03-07 14:28:25 +00:00
sthen
3cbe1c2f30 Reverse the polarity of MODPY_VERSION; default is now 3.x,
if a port needs 2.x then set MODPY_VERSION=${MODPY_DEFAULT_VERSION_2}.

This commit doesn't change any versions currently used; it may be that
some ports have MODPY_DEFAULT_VERSION_2 but don't require it, those
should be cleaned up in the course of updating ports where possible.

Python module ports providing py3-* packages should still use
FLAVOR=python3 so that we don't have a mixture of dependencies some
using ${MODPY_FLAVOR} and others not.
2021-02-23 19:39:08 +00:00
sthen
f62c6df989 update to mutt-2.0.5 - fix various memory leaks 2021-01-22 14:54:50 +00:00
sthen
4a13fd2d8e update to mutt-2.0.4 2020-12-31 10:22:01 +00:00
sthen
7247143ca2 update to mutt-2.0.3 2020-12-04 22:28:23 +00:00
sthen
87226b570c update to mutt-2.0.2 2020-11-20 18:03:04 +00:00
sthen
6cb6d27d7f update to mutt-2.0.1 2020-11-15 15:15:15 +00:00
sthen
b623e3cf9f Update to Mutt 2.0.0.
This has a major version number bump due to some incompatible changes
in behaviour or defaults, although the code changes are less big than some
other "lesser" bumps.

See http://www.mutt.org/relnotes/2.0/ for details.
2020-11-07 22:20:46 +00:00
jca
b59233c341 Remove gnupg-1.4 and replace it with gnupg-2
gnupg-1.4 is not developed actively anymore, and new software expects
a modern "gpg" executable, which leads to pointless patches in the ports
tree.  Move the various users of security/gnupg2 to security/gnupg and
zap patches that forced the use of "gpg2".

Crusade started by edd@ (security/gnupg maintainer), gnupg->gnupg2 test
reports from semarie@, giovanni@ and solene@, input and bulk build by
sthen@.  ok sthen@ edd@ (maintainer)
2020-10-05 19:46:17 +00:00
sthen
2f59325c9f update to mutt-1.14.7 2020-08-31 16:52:03 +00:00
sthen
f8aea34d6b update to mutt-1.14.6
This is a bug-fix release fixing a problem resetting access times that snuck
in starting with 1.11.0.  This only affected relative-path mailboxes, but
caused Mutt to "forget" new mail in mbox files.
2020-07-11 23:40:14 +00:00
sthen
6cc9779250 switch my maintainer email addresses to my own domain 2020-07-11 22:54:35 +00:00
sthen
ffb7b08982 update to mutt-1.14.5 2020-06-25 14:02:33 +00:00
sthen
08ed0b9a37 mutt: patch to workaround problem introduced in security fix; don't break 2020-06-21 11:41:31 +00:00
sthen
9e1e28338e update to mutt-1.14.4, fixes possible machine-in-the-middle response
injection attack when using STARTTLS with IMAP, POP3, and SMTP.
2020-06-19 05:59:38 +00:00
sthen
54c633e893 update to mutt-1.14.3
Fix possible IMAP man-in-the-middle attack. No credentials are exposed,
but could result in unintended emails being "saved" to an attacker's
server. The $ssl_starttls quadoption is now used to check for an
unencrypted PREAUTH response from the server.

(the release also had a gnutls fix, but we don't use gnutls in the port).
2020-06-15 11:47:21 +00:00
sthen
e36b1d8520 update to mutt-1.14.2 2020-05-26 12:11:40 +00:00
sthen
2869ec40b2 update to mutt-1.14.1 2020-05-17 11:36:26 +00:00
sthen
8ad2d79915 update to mutt-1.14.0 2020-05-14 11:41:47 +00:00
sthen
32997cdfed update to mutt-1.13.5 2020-03-29 15:36:45 +00:00
sthen
3864ada45f update to mutt-1.13.4 2020-02-15 23:16:18 +00:00
sthen
604262f7bf update to mutt-1.13.3 2020-01-13 22:31:02 +00:00
sthen
15f429486f cherrypick mutt patch to fix a crash when polling a closed ssl connection,
issue diagnosed and original patch proposed by stsp@
2020-01-08 00:11:22 +00:00
sthen
be80253e45 update to mutt-1.13.2 2019-12-19 13:49:44 +00:00
sthen
a1a2805a5d Update to mutt-1.13.1, fixes a use-after-free related to resuming
imap postponed messages that I ran into which were highlighted by our
malloc. Many thanks to Kevin McCarthy (upstream) for the quick fixes!
2019-12-15 23:52:48 +00:00
sthen
ff682128c4 add DEBUG_PACKAGES for mutt, move the existing ".if defined(DEBUG)" (to enable
debug logging) to a flavour.
2019-12-08 16:59:09 +00:00
sthen
89c82950bb update to mutt-1.13.0. enable the new support for autocrypt in the gpgme flavour. 2019-12-02 12:19:55 +00:00
sthen
43e2417768 update to mutt-1.12.2 2019-09-22 00:04:21 +00:00
sthen
9e48584ada update to mutt-1.12.1 2019-06-16 17:18:10 +00:00
sthen
9c6e9626b9 s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
in ports which I maintain
2019-06-03 16:06:50 +00:00
sthen
e8a6cc002c handle previous differently (tweak Makefile to avoid recompiles in 'fake',
and go back to our usual "FAKE_FLAGS= sysconfdir=${PREFIX}/share/examples/xx"
mechanism); help from espie and discussed with upstream
2019-05-31 10:25:34 +00:00