if you have problems with neomutt please first check if they have been
fixed upstream (https://github.com/neomutt/neomutt, copy the full commit
id from the URL in "Latest commit", update GH_COMMIT and rebuild), if the
problem still occurs then please report upstream with as much info to
reproduce as possible.
ppl wanting to use the 'Provider for google calendar' addon should use
the addon manager to install it in their profile.
While here remove some old cruft - no REVISION bump as it didnt build.
Fixes build breakage reported by ajacoutot@, thanks !
See https://www.thunderbird.net/en-US/thunderbird/68.2.1/releasenotes/
Use --disable-sandbox in CONFIGURE_ARGS instead of setting invalid
pledge strings, thunderbird is a monolithic process so far anyway so its
pledge would be super wide.. to be revisited by someone someday ?
- some people who haven't configured a redis backend themselves ran in
to problems with medium-scoring messages getting stuck in greylisting.
add an RDEP on redis and a pkg-readme with information about this and
some other things to hopefully make it easier to work with "out of the
box"
- add @extraunexec to PLIST.
jcs@ noted that sandbox should be only enabled with --enable-sandbox (what
thunderbird doesn't use).
sets the promises for now to permit quick fix, to permit users to figure what
pledge promises are needed without rebuilding the whole package.
ok landry@ sthen@
disconnect command is issued without any prior. This results in an invalid
free.
Found by and fix tested by Mischa Peters
port diff looks good to jasper@
for Apache SpamAssassin
help, upstream code and ok jung@
pkg/DESCR:
filter-spamassassin is an opensmtpd filter that passes mail through
Apache SpamAssassin to flag or reject spam messages at session time.
"There is a heap-based buffer overflow in string_vformat (string.c).
The currently known exploit uses a extraordinary long EHLO string to
crash the Exim process that is receiving the message. While at this
mode of operation Exim already dropped its privileges, other paths to
reach the vulnerable code may exist."