Commit Graph

391 Commits

Author SHA1 Message Date
Daniel Golle d7171340c6 exim: update to version 4.96.2
Fixes vulnerabilities:
 - Improper Neutralization of Special Elements (CVE-2023-42117)
 - dnsdb Out-Of-Bounds Read (CVE-2023-42119)

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 86ec7b19bc)
2023-10-27 22:50:16 +01:00
Daniel Golle 8361a8f402 exim: update to version 4.96.1
This is a security release.

JH/01 Bug 2999: Fix a possible OOB write in the external authenticator, which
      could be triggered by externally-supplied input.  Found by Trend Micro.
      CVE-2023-42115

JH/02 Bug 3000: Fix a possible OOB write in the SPA authenticator, which could
      be triggered by externally-controlled input.  Found by Trend Micro.
      CVE-2023-42116

JH/03 Bug 3001: Fix a possible OOB read in the SPA authenticator, which could
      be triggered by externally-controlled input.  Found by Trend Micro.
      CVE-2023-42114

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 7c8f4a2a1c)
2023-10-08 05:12:48 +02:00
Daniel Golle a475867425 exim: apply hotfix for some ZDI reported vulnerabilities
Apply preliminary hotfix for some (three?) of the 0-day
vulnerabilities reported by ZDI.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit db85d9ead6)
2023-10-02 11:35:44 +01:00
Josef Schlehofer 1c6b81f3c1 msmtp: update to version 1.8.24
Release notes:
ef62463e4dX

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 29a9a6a4a7)
2023-09-22 00:28:57 +02:00
Hauke Mehrtens cafcd75d7c postfix: Fix compile against glibc 2.36
This backports a change from postfix 3.8, I do not know exactly why it
detects Linux 6 here, but this is needed to fix compilation with glibc
2.36.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
(cherry picked from commit 33786efe66)
2023-09-21 23:35:38 +02:00
Sergey Ponomarev 0dab01d398 emailrelay: update to v2.4.1
The patch seems not needed anymore.
Also remove deprecated PKG_RELEASE:=$(AUTORELEASE)

Signed-off-by: Sergey Ponomarev <stokito@gmail.com>
(cherry picked from commit 735cba83ce)
2023-09-20 02:18:28 +02:00
Eneas U de Queiroz f5f990d7d7 alpine: disable parallel build
Parallel build does not work because it may reach a point where OSTYPE
might be needed before it is actually built.  They appear to run
parallel to each other:

echo slx > OSTYPE
[...]
cat: OSTYPE: No such file or directory
sh: line 1: test: too many arguments
cat: OSTYPE: No such file or directory
Already built for -- you must do "make clean" first
make[6]: *** [Makefile:706: rebuild] Error 1
make[6]: *** Waiting for unfinished jobs....

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit 0e652e2449)
2023-09-20 02:17:49 +02:00
Rosen Penev c9c122966a alpine: fix old URL
Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 40c685e616)
2023-09-20 02:17:44 +02:00
Daniel Golle 45e88fc589 pigeonhole: update to version 0.5.20
v0.5.20 2022-12-12  Aki Tuomi <aki.tuomi@open-xchange.com>

    * No changes - release done to keep version numbers synced.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 470c63d1c1)
2023-05-14 18:53:41 +02:00
W. Michael Petullo 5d50b09bbe pigeonhole: update to 0.5.19
Signed-off-by: W. Michael Petullo <mike@flyn.org>
(cherry picked from commit 7316c74177)
2023-05-14 18:53:41 +02:00
Daniel Golle a3073e93f7 dovecot: update to version 2.3.20
v2.3.20 2022-12-22  Aki Tuomi <aki.tuomi@open-xchange.com>

    + Add dsync_features=no-header-hashes. When this setting is enabled and
      one dsync side doesn't support mail GUIDs (i.e. imapc), there is no
      fallback to using header hashes. Instead, dsync assumes that all mails
      with identical IMAP UIDs contains the same mail contents. This can
      significantly improve dsync performance with some IMAP servers that
      don't support caching Date/Message-ID headers.
    + lua: HTTP client has more settings now, see
      https://doc.dovecot.org/admin_manual/lua/#dovecot.http.client
    + replicator: "doveadm replicator status" command now outputs when the
      next sync is expected for the user.
    - LAYOUT=index: duplicate GUIDs were not cleaned out. Also the list
      recovery was not optimal.
    - auth: Assert crash would occur when iterating multiple userdb
      backends.
    - director: Logging into director using master user with
      auth_master_user_separator character redirected user to a wrong
      backend, unless master_user_separator setting was also set to the same
      value. Merged these into auth_master_user_separator.
    - dsync: Couldn't always fix folder GUID conflicts automatically with
      Maildir format. This resulted in replication repeatedly failing
      with "Remote lost mailbox GUID".
    - dsync: Failed to migrate INBOX when using namespace prefix=INBOX/,
      resulting in "Remote lost mailbox GUID" errors.
    - dsync: INBOX was created too early with namespace prefix=INBOX/,
      resulting a GUID conflict. This may have been resolved automatically,
      but not always.
    - dsync: v2.3.18 regression: Wrong imapc password with dsync caused
      Panic: file lib-event.c: line 506 (event_pop_global):
      assertion failed: (event == current_global_event)
    - imapc: Requesting STATUS for a mailbox with imapc and INDEXPVT
      configured did not return correct (private) unseen counts.
    - lib-dict: Process would crash when committing data to redis without
      dict proxy.
    - lib-mail: Corrupted cached BODYSTRUCTURE caused panic during FETCH.
      Fixes: Panic: file message-part-data.c: line 579 (message_part_is_attachment):
      assertion failed: (data != NULL). v2.3.13 regression.
    - lib-storage: mail_attribute_dict with dict-sql failed when it tried to
      lookup empty dict keys.
    - lib: ioloop-kqueue was missing include breaking some BSD builds.
    - lua-http: Dovecot Lua HTTP client could not resolve DNS names in mail
      processes, because it expected "dns-client" socket to exist in the
      current directory.
    - oauth2: Using %{oauth2:name} variables could cause useless
      introspections.
    - pop3: Sending POP3 command with ':' character caused an assert-crash.
      v2.3.18 regression.
    - replicator: Replication queue had various issues, potentially causing
      replication requests to become stuck.
    - stats: Invalid Prometheus label names were created with specific
      histogram group_by configurations. Prometheus rejected these labels.

v2.3.19.1 2022-06-14  Aki Tuomi <aki.tuomi@open-xchange.com>

    - doveadm deduplicate: Non-duplicate mails were deleted.
      v2.3.19 regression.
    - auth: Crash would occur when iterating multiple backends.
      Fixes: Panic: file userdb-blocking.c:
      line 125 (userdb_blocking_iter_next): assertion failed: (ctx->conn != NULL)

v2.3.19 2022-05-10  Aki Tuomi <aki.tuomi@open-xchange.com>

    + Added mail_user_session_finished event, which is emitted when the mail
      user session is finished (e.g. imap, pop3, lmtp). It also includes
      fields with some process statistics information.
      See https://doc.dovecot.org/admin_manual/list_of_events/ for more
      information.
    + Added process_shutdown_filter setting. When an event matches the filter,
      the process will be shutdown after the current connection(s) have
      finished. This is intended to reduce memory usage of long-running imap
      processes that keep a lot of memory allocated instead of freeing it to
      the OS.
    + auth: Add cache hit indicator to auth passdb/userdb finished events.
      See https://doc.dovecot.org/admin_manual/list_of_events/ for more
      information.
    + doveadm deduplicate: Performance is improved significantly.
    + imapc: COPY commands were sent one mail at a time to the remote IMAP
      server. Now the copying is buffered, so multiple mails can be copied
      with a single COPY command.
    + lib-lua: Add a Lua interface to Dovecot's HTTP client library. See
      https://doc.dovecot.org/admin_manual/lua/ for more information.
    - auth: Cache lookup would use incorrect cache key after username change.
    - auth: Improve handling unexpected LDAP connection errors/hangs.
      Try to fix up these cases by reconnecting to the LDAP server and
      aborting LDAP requests earlier.
    - auth: Process crashed if userdb iteration was attempted while auth-workers
      were already full handling auth requests.
    - auth: db-oauth2: Using %{oauth2:name} variables caused unnecessary
      introspection requests.
    - dict: Timeouts may have been leaked at deinit.
    - director: Ring may have become unstable if a backend's tag was changed.
      It could also have caused director process to crash.
    - doveadm kick: Numeric parameter was treated as IP address.
    - doveadm: Proxying can panic when flushing print output. Fixes
      Panic: file ioloop.c: line 865 (io_loop_destroy): assertion failed:
      (ioloop == current_ioloop).
    - doveadm sync: BROKENCHAR was wrongly changed to '_' character when
      migrating mailboxes. This was set by default to %, so any mailbox
      names containing % characters were modified to "_25".
    - imapc: Copying or moving mails with doveadm to an imapc mailbox could
      have produced "Error: Syncing mailbox '[...]' failed" Errors. The
      operation itself succeeded but attempting to sync the destination
      mailbox failed.
    - imapc: Prevent index log synchronization errors when two or more imapc
      sessions are adding messages to the same mailbox index files, i.e.
      INDEX=MEMORY is not used.
    - indexer: Process was slowly leaking memory for each indexing request.
    - lib-fts: fts header filters caused binary content to be sent to the
      indexer with non-default configuration.
    - doveadm-server: Process could hang in some situations when printing
      output to TCP client, e.g. when printing doveadm sync state.
    - lib-index: dovecot.index.log files were often read and parsed entirely,
      rather than only the parts that were actually necessary. This mainly
      increased CPU usage.
    - lmtp-proxy: Session ID forwarding would cause same session IDs being
      used when delivering same mail to multiple backends.
    - log: Log prefix update may have been lost if log process was busy.
      This could have caused log prefixes to be empty or in some cases
      reused between sessions, i.e. log lines could have been logged for the
      wrong user/session.
    - mail_crypt: Plugin crashes if it's loaded only for some users. Fixes
      Panic: Module context mail_crypt_user_module missing.
    - mail_crypt: When LMTP was delivering mails to both recipients with mail
      encryption enabled and not enabled, the non-encrypted recipients may
      have gotten mails encrypted anyway. This happened when the first
      recipient was encrypted (mail_crypt_save_version=2) and the 2nd
      recipient was not encrypted (mail_crypt_save_version=0).
    - pop3: Session would crash if empty line was sent.
    - stats: HTTP server leaked memory.
    - submission-login: Long credentials, such as OAUTH2 tokens, were refused
      during SASL interactive due to submission server applying line length
      limits.
    - submission-login: When proxying to remote host, authentication was not
      using interactive SASL when logging in using long credentials such as
      OAUTH2 tokens. This caused authentication to fail due to line length
      constraints in SMTP protocol.
    - submission: Terminating the client connection with QUIT command after
      mail transaction is started with MAIL command and before it is
      finished with DATA/BDAT can cause a segfault crash.
    - virtual: doveadm search queries with mailbox-guid as the only parameter
      crashes: Panic: file virtual-search.c: line 77 (virtual_search_get_records):
      assertion failed: (result != 0)

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit a1648fbd1c)
2023-05-14 18:53:41 +02:00
Juan del Bosque 4c8d58532f dovecot: Fix iconv macro is missing compile error
Fix a Dovecot compile error when building with no other packages than
the default in master build, because iconv macro is missing.

Fixes: #20677

Signed-off-by: Juan del Bosque <juan@web64.pro>
(cherry picked from commit 96145db78a)
2023-05-14 18:53:41 +02:00
Daniel Golle 5d5348bc59
exim: update to version 4.96
Exim version 4.96
-----------------

JH/01 Move the wait-for-next-tick (needed for unique message IDs) from
      after reception to before a subsequent reception.  This should
      mean slightly faster delivery, and also confirmation of reception
      to senders.

JH/02 Move from using the pcre library to pcre2.  The former is no longer
      being developed or supported (by the original developer).

JH/03 Constification work in the filters module required a major version
      bump for the local-scan API.  Specifically, the "headers_charset"
      global which is visible via the API is now const and may therefore
      not be modified by local-scan code.

JH/04 Fix ClamAV TCP use under FreeBSD. Previously the OS-specific shim for
      sendfile() didi not account for the way the ClamAV driver code called it.

JH/05 Bug 2819: speed up command-line messages being read in.  Previously a
      time check was being done for every character; replace that with one
      per buffer.

JH/06 Bug 2815: Fix ALPN sent by server under OpenSSL.  Previously the string
      sent was prefixed with a length byte.

JH/07 Change the SMTP feature name for pipelining connect to be compliant with
      RFC 5321.  Previously Dovecot (at least) would log errors during
      submission.

JH/08 Remove stripping of the binaries from the FreeBSD build.  This was added
      in 4.61 without a reason logged. Binaries will be bigger, which might
      matter on diskspace-constrained systems, but debug is easier.

JH/09 Fix macro-definition during "-be" expansion testing.  The move to
      write-protected store for macros had not accounted for these runtime
      additions; fix by removing this protection for "-be" mode.

JH/10 Convert all uses of select() to poll().  FreeBSD 12.2 was found to be
      handing out large-numbered file descriptors, violating the usual Unix
      assumption (and required by Posix) that the lowest possible number will be
      allocated by the kernel when a new one is needed.  In the daemon, and any
      child procesees, values higher than 1024 (being bigger than FD_SETSIZE)
      are not useable for FD_SET() [and hence select()] and overwrite the stack.
      Assorted crashes happen.

JH/11 Fix use of $sender_host_name in daemon process.  When used in certain
      main-section options or in a connect ACL, the value from the first ever
      connection was never replaced for subsequent connections.  Found by
      Wakko Warner.

JH/12 Bug 2838: Fix for i32lp64 hard-align platforms. Found for SPARC Linux,
      though only once PCRE2 was introduced: the memory accounting used under
      debug offset allocations by an int, giving a hard trap in early startup.
      Change to using a size_t.  Debug and fix by John Paul Adrian Glaubitz.

JH/13 Bug 2845: Fix handling of tls_require_ciphers for OpenSSL when a value
      with underbars is given.  The write-protection of configuration introduced
      in 4.95 trapped when normalisation was applied to an option not needing
      expansion action.

JH/14 Bug 1895: TLS: Deprecate RFC 5114 Diffie-Hellman parameters.

JH/15 Fix a resource leak in *BSD.  An off-by-one error resulted in the daemon
      failing to close the certificates directory, every hour or any time it
      was touched.

JH/16 Debugging initiated by an ACL control now continues through into routing
      and transport processes.  Previously debugging stopped any time Exim
      re-execs, or for processing a queued message.

JH/17 The "expand" debug selector now gives more detail, specifically on the
      result of expansion operators and items.

JH/18 Bug 2751: Fix include_directory in redirect routers.  Previously a
      bad comparison between the option value and the name of the file to
      be included was done, and a mismatch was wrongly identified.
      4.88 to 4.95 are affected.

JH/19 Support for Berkeley DB versions 1 and 2 is withdrawn.

JH/20 When built with NDBM for hints DB's check for nonexistence of a name
      supplied as the db file-pair basename.  Previously, if a directory
      path was given, for example via the autoreply "once" option, the DB
      file.pag and file.dir files would be created in that directory's
      parent.

JH/21 Remove the "allow_insecure_tainted_data" main config option and the
      "taint" log_selector.  These were previously deprecated.

JH/22 Fix static address-list lookups to properly return the matched item.
      Previously only the domain part was returned.

JH/23 Bug 2864: FreeBSD: fix transport hang after 4xx/5xx response. Previously
      the call into OpenSSL to send a TLS Close was being repeated; this
      resulted in the library waiting for the peer's Close.  If that was never
      sent we waited forever.  Fix by tracking send calls.

JH/24 The ${run} expansion item now expands its command string elements after
      splitting.  Previously it was before; the new ordering makes handling
      zero-length arguments simpler.  The old ordering can be obtained by
      appending a new option "preexpand", after a comma, to the "run".

JH/25 Taint-check exec arguments for transport-initiated external processes.
      Previously, tainted values could be used.  This affects "pipe", "lmtp" and
      "queryprogram" transport, transport-filter, and ETRN commands.
      The ${run} expansion is also affected: in "preexpand" mode no part of
      the command line may be tainted, in default mode the executable name
      may not be tainted.

JH/26 Fix CHUNKING on a continued-transport.  Previously the usabliility of
      the the facility was not passed across execs, and only the first message
      passed over a connection could use BDAT; any further ones using DATA.

JH/27 Support the PIPECONNECT facility in the smtp transport when the helo_data
      uses $sending_ip_address and an interface is specified.
      Previously any use of the local address in the EHLO name disabled
      PIPECONNECT, the common case being to use the rDNS of it.

JH/28 OpenSSL: fix transport-required OCSP stapling verification under session
      resumption. Previously verify failed because no certificate status is
      passed on the wire for the restarted session. Fix by using the recorded
      ocsp status of the stored session for the new connection.

JH/29 TLS resumption: the key for session lookup in the client now includes
      more info that a server could potentially use in configuring a TLS
      session, avoiding oferring mismatching sessions to such a server.
      Previously only the server IP was used.

JH/30 Fix string_copyn() for limit greater than actual string length.
      Previously the copied amount was the limit, which could result in a
      overlapping memcpy for newly allocated destination soon after a
      source string shorter than the limit.  Found/investigated  by KM.

JH/31 Bug 2886: GnuTLS: Do not free the cached creds on transport connection
      close; it may be needed for a subsequent connection.  This caused a
      SEGV on primary-MX defer.  Found/investigated by Gedalya & Andreas.

JH/32 Fix CHUNKING for a second message on a connection when the first was
      rejected.  Previously we did not reset the chunking-offered state, and
      erroneously rejected the BDAT command.  Investigation help from
      Jesse Hathaway.

JH/33 Fis ${srs_encode ...} to handle an empty sender address, now returning
      an empty address.  Previously the expansion returned an error.

HS/01 Bug 2855: Handle a v4mapped sender address given us by a frontending
      proxy.  Previously these were misparsed, leading to paniclog entries.

Also contains commit 51be321b27 "Fix PAM auth. Bug 2813" addressing
CVE-2022-37451.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit f2763b95af)
2022-10-13 19:57:46 +01:00
Rosen Penev 9552a30bc5 mutt: add PKG_CONFIG_DEPENDS
Should fix missing dependencies when manupulating options.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit ecd3a8a8de)
2022-07-20 11:38:31 -07:00
Michal Vasilek c1732453f7
postfix: fix download failure
cdn.postfix.johnriley.me serves a certificate for a different domain
name.

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit d4feef97e6)
2022-07-17 15:03:44 +02:00
W. Michael Petullo 2d0893afbc
pigeonhole: update to 2.3.18
Signed-off-by: W. Michael Petullo <mike@flyn.org>
(cherry picked from commit c0fbb4f7fd)
2022-05-20 23:10:09 +02:00
W. Michael Petullo 2904343fba
dovecot: update to 2.3.18
Signed-off-by: W. Michael Petullo <mike@flyn.org>
(cherry picked from commit 4c2306468a)
2022-05-20 23:10:04 +02:00
Sergey V. Lobanov 11a79e9aa2 Revert "postfix: fix build on macos"
This reverts commit 9d8171aa06.
2022-02-11 17:56:07 -08:00
Rosen Penev 0bd444e694 emailrelay: don't disable fortify source
GCC8 and 9 are gone.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-02-04 11:19:33 -08:00
Matthew Hagan 951a74f431 mutt: update to 2.1.5
Signed-off-by: Matthew Hagan <mnhagan88@gmail.com>
2022-02-02 12:35:55 -08:00
Matthew Hagan bf3fe181af mutt: add header caching support via libgdbm
Add header caching option to mutt, using the libgdbm database routines.

Signed-off-by: Matthew Hagan <mnhagan88@gmail.com>
2022-02-02 12:35:55 -08:00
Matthew Hagan 8221e9db44 mutt: move configurables to Config.in
Signed-off-by: Matthew Hagan <mnhagan88@gmail.com>
2022-02-02 12:35:55 -08:00
Sergey V. Lobanov 9d8171aa06 postfix: fix build on macos
macos build fails due to two reasons:
1. using build host ar and ranlib tools
2. using uname -r to get kernel version

First issue is fixed by specifying ar and ranlib from toolchain
Second issue is fixed by specifying kernel release major version=5
Using 'uname -r' from build host for cross-compiling is not a good
idea even for Linux build host

Signed-off-by: Sergey V. Lobanov <sergey@lobanov.in>
2022-01-25 15:32:39 -08:00
Sergey V. Lobanov b4820ec363 mblaze: fix build on macos
redefine OS=Linux due to OpenWrt is always Linux

Signed-off-by: Sergey V. Lobanov <sergey@lobanov.in>
2022-01-11 14:55:33 -08:00
Hauke Mehrtens 99fc0216e0 postfix: Fix compile with glibc 2.34
This adds a patch from Open embedded to fix compilation with glibc 2.34.
This patch was taken from here:
https://github.com/openembedded/meta-openembedded/blob/master/meta-networking/recipes-daemons/postfix/files/0007-correct-signature-of-closefrom-API.patch

It fixes the following build problem:
/builder/shared-workdir/build/sdk/staging_dir/toolchain-arc_arc700_gcc-11.2.0_glibc/include/unistd.h:366:13: error: conflicting types for 'closefrom'; have 'void(int)'
  366 | extern void closefrom (int __lowfd) __THROW;
      |             ^~~~~~~~~
In file included from attr_clnt.c:87:
./sys_defs.h:1511:12: note: previous declaration of 'closefrom' with type 'int(int)'
 1511 | extern int closefrom(int);
      |            ^~~~~~~~~
make: *** [Makefile:192: attr_clnt.o] Error 1

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2022-01-09 15:25:13 -08:00
Rosen Penev ff1c63cd5c alpine: update to 2.25
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-12-17 23:02:38 -08:00
Rosen Penev f5e54f949b mblaze: update to 1.2
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-12-16 15:26:52 -08:00
Josef Schlehofer 173faad334 msmtp: update to version 1.8.1.9
Changelog:
https://marlam.de/msmtp/news/msmtp-1-8-19/

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-12-04 07:30:39 +01:00
Matthew Hagan 1f61285463 postfix: prevent displaying config options when not enabled
Postfix's options should not be visible in the config when Postfix
is not enabled.

Secondly, place the config option menu behind the Postfix option rather
than underneath.

Signed-off-by: Matthew Hagan <mnhagan88@gmail.com>
2021-11-08 17:56:46 -08:00
Matthew Hagan abca3c73e6 mutt: prevent exposing mutt config options when not enabled
Ensure Mutt's configuration options do not appear in the config when
Mutt is not enabled.

Reported-by: Stijn Segers <foss@volatilesystems.org>
Signed-off-by: Matthew Hagan <mnhagan88@gmail.com>
2021-11-08 17:56:46 -08:00
Josef Schlehofer 18261fcd31 msmtp: update to version 1.8.17
- Use AUTORELEASE fce
It helps when someone forgets to bump PKG_RELEASE

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-10-17 10:14:55 -07:00
Daniel Golle 40c71110f0
exim: update to version 4.95
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-10-09 17:02:48 +01:00
Matthew Hagan 19877a952d mutt: add smtp, sasl, gnutls, menuconfig options
Compile tested: bcm53xx, MX65, master

Add support for SMTP, SASL, GnuTLS and POP, IMAP, OpenSSL in the
menuconfig. The SMTP/SASL configurable was required to successfully
send email on GMail. Tested separately using OpenSSL and GnuTLS.

Signed-off-by: Matthew Hagan <mnhagan88@gmail.com>
2021-10-08 09:49:44 -07:00
Alexandru Ardelean 29b9eb599a
Merge pull request #16679 from paper42/mutt-2.1.3
mutt: update to 2.1.3
2021-09-28 10:56:47 +03:00
Rosen Penev 489e60de08 pigeonhole: update to 0.5.16
Update URL.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-09-25 20:14:14 -07:00
Michal Vasilek de8808c864
mutt: update to 2.1.3
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2021-09-21 18:52:06 +02:00
Lucian Cristian 95f2ce90ca dovecot: update to 2.3.16
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2021-09-19 15:19:01 -07:00
Michal Vasilek 7fd192e55f
mutt: update to 2.1.2, switch to AUTORELEASE
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2021-08-26 12:17:26 +02:00
Rosen Penev 1062324202
Merge pull request #16322 from paper42/mblaze
mblaze: new package
2021-08-18 02:04:56 -07:00
Daniel Golle 66a62e2fcf
exim: some clean ups
* use username/group 'exim' instead of mail
 * register configuration file
 * make sure /usr/lib/exim/lookups exists

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-08-13 04:51:38 +01:00
Daniel Golle 31d12ead78
exim: add default config and init script, enable lmtp
Ship default configuration /etc/exim/exim.conf as well as
a simple procd init script. Enable building with LMTP for better
integration with dovecot.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-08-12 03:11:40 +01:00
Michal Vasilek 80f7a8ec8b
mblaze: new package
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2021-08-11 15:15:13 +02:00
Rosen Penev d45965e22d emailrelay: fix compilation with GCC11
Missing header.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-07-07 14:51:09 -07:00
Josef Schlehofer 110abfb9f6 msmtp: update to version 1.8.15
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-06-01 00:45:48 +02:00
Daniel Golle c241cb12bb
exim: update to version 4.94.2
Several exploitable vulnerabilities in Exim were reported to us and are
fixed.
Local vulnerabilities
- CVE-2020-28007: Link attack in Exim's log directory
- CVE-2020-28008: Assorted attacks in Exim's spool directory
- CVE-2020-28014: Arbitrary PID file creation
- CVE-2020-28011: Heap buffer overflow in queue_run()
- CVE-2020-28010: Heap out-of-bounds write in main()
- CVE-2020-28013: Heap buffer overflow in parse_fix_phrase()
- CVE-2020-28016: Heap out-of-bounds write in parse_fix_phrase()
- CVE-2020-28015: New-line injection into spool header file (local)
- CVE-2020-28012: Missing close-on-exec flag for privileged pipe
- CVE-2020-28009: Integer overflow in get_stdinput()
Remote vulnerabilities
- CVE-2020-28017: Integer overflow in receive_add_recipient()
- CVE-2020-28020: Integer overflow in receive_msg()
- CVE-2020-28023: Out-of-bounds read in smtp_setup_msg()
- CVE-2020-28021: New-line injection into spool header file (remote)
- CVE-2020-28022: Heap out-of-bounds read and write in extract_option()
- CVE-2020-28026: Line truncation and injection in spool_read_header()
- CVE-2020-28019: Failure to reset function pointer after BDAT error
- CVE-2020-28024: Heap buffer underflow in smtp_ungetc()
- CVE-2020-28018: Use-after-free in tls-openssl.c
- CVE-2020-28025: Heap out-of-bounds read in pdkim_finish_bodyhash()

The update to 4.94.2 also integrates a fix for a printf format issue
previously addressed by a local patch which is removed.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-05-10 04:20:47 +01:00
Eneas U de Queiroz 9fb776ec1d
mutt: don't use host mailpath definition
Use configure --with-mailpath=/var/mail instead of letting it guess the
value base on the host path.  If configure can't find it, the package
will fail to build.  The path was taken from the current bot build.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2021-04-19 21:34:05 -03:00
Alexander Ryzhov 34a587275e fdm: don't use host headers
Signed-off-by: Alexander Ryzhov <github@ryzhov-al.ru>
2021-04-14 02:11:40 -07:00
Rosen Penev de9c527e9a exim: fix compilation without deprecated OpenSSL APIs
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-26 13:14:18 -07:00
Rosen Penev b80af2eb31 emailrelay: update to 2.2
Remove upstreamed patch.

Switch to AUTORELEASE for simplicity.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-12 15:05:49 -08:00
Eneas U de Queiroz e40776d264
pigeonhole: bump to 0.5.14
ChangeLog:
 - IMAP FILTER command: cmd-filter-sieve - Do not allow NIL as script
   name argument.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2021-03-04 09:13:20 -03:00