notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
Port details
fetchmail Batch mail retrieval utility for IMAP/POP3/ETRN/ODMR
6.5.1 mail on this many watch lists=213 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 6.4.39Version of this port present on the latest quarterly branch.
Maintainer: chalpin@cs.wisc.edu search for ports maintained by this maintainer
Port Added: unknown
Last Update: 2024-11-15 16:59:19
Commit Hash: 702b257
People watching this port, also watch:: gmake, libiconv, gettext, png, expat
License: GPLv2+
WWW:
https://www.fetchmail.info/
Description:
Fetchmail is a full-featured IMAP/POP2/POP3/APOP/KPOP/ETRN/ODMR client with easy configuration, daemon mode, forwarding via SMTP or local MDA, and superior reply handling. It is used to handle intermittent email connections by acting as a coupling that seamlessly batch forwards fetched mail from your mail server to your local delivery system, allowing you to read it with your favourite mail user agent. Fetchmail also includes useful spam filtering and multi-user functions. A typical use of fetchmail is to connect to your ISP's POP3 server, downloading your mail into the INBOX on your local computer. You may then read the mail, offline if you want, using pine, mutt, or any standard mail user agent.
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb - no subversion history for this port

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
Expand this list (20 items)
Collapse this list.
  1. /usr/local/share/licenses/fetchmail-6.5.1/catalog.mk
  2. /usr/local/share/licenses/fetchmail-6.5.1/LICENSE
  3. /usr/local/share/licenses/fetchmail-6.5.1/GPLv2+
  4. bin/fetchmail
  5. share/man/man1/fetchmail.1.gz
  6. share/locale/cs/LC_MESSAGES/fetchmail.mo
  7. share/locale/de/LC_MESSAGES/fetchmail.mo
  8. share/locale/eo/LC_MESSAGES/fetchmail.mo
  9. share/locale/es/LC_MESSAGES/fetchmail.mo
  10. share/locale/fr/LC_MESSAGES/fetchmail.mo
  11. share/locale/ja/LC_MESSAGES/fetchmail.mo
  12. share/locale/pl/LC_MESSAGES/fetchmail.mo
  13. share/locale/ro/LC_MESSAGES/fetchmail.mo
  14. share/locale/sq/LC_MESSAGES/fetchmail.mo
  15. share/locale/sv/LC_MESSAGES/fetchmail.mo
  16. @sample(fetchmail,fetchmail,600) etc/fetchmailrc.sample
  17. @dir(fetchmail,fetchmail,755) /var/run/fetchmail
  18. @owner
  19. @group
  20. @mode
Collapse this list.
Dependency lines:
  • fetchmail>0:mail/fetchmail
To install the port:
cd /usr/ports/mail/fetchmail/ && make install clean
To add the package, run one of these commands:
  • pkg install mail/fetchmail
  • pkg install fetchmail
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: fetchmail
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1731628928 SHA256 (fetchmail-6.5.1.tar.xz) = ca3fdb95141c277aca109be77f4d45b47e03ee010043058dd90bc182db518d4a SIZE (fetchmail-6.5.1.tar.xz) = 1110924

Packages (timestamps in pop-ups are UTC):
fetchmail
ABIaarch64amd64armv6armv7i386powerpcpowerpc64powerpc64le
FreeBSD:13:latest6.5.0_16.5.16.4.146.5.0_16.5.1-6.4.14-
FreeBSD:13:quarterly6.4.396.4.396.4.376.4.396.4.396.4.37_16.4.37_16.4.38
FreeBSD:14:latest6.5.0_16.5.16.4.346.5.0_16.5.16.4.37-6.4.37
FreeBSD:14:quarterly6.4.396.4.39-6.4.396.4.396.4.37_16.4.37_16.4.38
FreeBSD:15:latest6.5.16.5.1n/a6.5.0_1n/a6.4.37_26.4.37_26.4.38
Slave ports:
  1. mail/fetchmailconf
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. gmake>=4.4.1 : devel/gmake
  2. gettext-runtime>=0.22_1 : devel/gettext-runtime
  3. msgfmt : devel/gettext-tools
Library dependencies:
  1. libintl.so : devel/gettext-runtime
This port is required by:
for Build
  1. mail/fetchmailconf
for Run
  1. mail/fetchmailconf

Configuration Options:
===> The following configuration options are available for fetchmail-6.5.1: DOCS=on: Build and/or install documentation NLS=on: Native Language Support OPIE=off: Build with OPIE support (deprecated - weak/broken cryptography) RPA=on: Build with RPA support (deprecated - weak/broken cryptography) ====> GSSAPI Security API support: you have to select exactly one of them GSSAPI_BASE=on: GSSAPI support via base system (needs Kerberos) GSSAPI_HEIMDAL=off: GSSAPI support via security/heimdal GSSAPI_MIT=off: GSSAPI support via security/krb5 GSSAPI_NONE=off: Disable GSSAPI support ====> Secure network connection support via TLS: you have to select exactly one of them OPENSSL=on: SSL/TLS support via OpenSSL WOLFSSL=off: SSL/TLS support via wolfSSL ===> Use 'make config' to modify these settings
Options name:
mail_fetchmail
USES:
cpe gmake tar:xz gssapi gettext ssl
pkg-message:
For install:
For pointers how to configure fetchmail in daemon mode please consult /usr/local/etc/rc.d/fetchmail.
Master Sites:
Expand this list (48 items)
Collapse this list.
  1. http://cfhcable.dl.sourceforge.net/project/fetchmail/branch_6.5/
  2. http://cytranet.dl.sourceforge.net/project/fetchmail/branch_6.5/
  3. http://deac-ams.dl.sourceforge.net/project/fetchmail/branch_6.5/
  4. http://deac-fra.dl.sourceforge.net/project/fetchmail/branch_6.5/
  5. http://deac-riga.dl.sourceforge.net/project/fetchmail/branch_6.5/
  6. http://downloads.sourceforge.net/project/fetchmail/branch_6.5/
  7. http://excellmedia.dl.sourceforge.net/project/fetchmail/branch_6.5/
  8. http://freefr.dl.sourceforge.net/project/fetchmail/branch_6.5/
  9. http://gigenet.dl.sourceforge.net/project/fetchmail/branch_6.5/
  10. http://ixpeering.dl.sourceforge.net/project/fetchmail/branch_6.5/
  11. http://jaist.dl.sourceforge.net/project/fetchmail/branch_6.5/
  12. http://kumisystems.dl.sourceforge.net/project/fetchmail/branch_6.5/
  13. http://liquidtelecom.dl.sourceforge.net/project/fetchmail/branch_6.5/
  14. http://nchc.dl.sourceforge.net/project/fetchmail/branch_6.5/
  15. http://netactuate.dl.sourceforge.net/project/fetchmail/branch_6.5/
  16. http://netcologne.dl.sourceforge.net/project/fetchmail/branch_6.5/
  17. http://onboardcloud.dl.sourceforge.net/project/fetchmail/branch_6.5/
  18. http://phoenixnap.dl.sourceforge.net/project/fetchmail/branch_6.5/
  19. http://razaoinfo.dl.sourceforge.net/project/fetchmail/branch_6.5/
  20. http://sinalbr.dl.sourceforge.net/project/fetchmail/branch_6.5/
  21. http://sitsa.dl.sourceforge.net/project/fetchmail/branch_6.5/
  22. http://tenet.dl.sourceforge.net/project/fetchmail/branch_6.5/
  23. http://ufpr.dl.sourceforge.net/project/fetchmail/branch_6.5/
  24. http://versaweb.dl.sourceforge.net/project/fetchmail/branch_6.5/
  25. https://cfhcable.dl.sourceforge.net/project/fetchmail/branch_6.5/
  26. https://cytranet.dl.sourceforge.net/project/fetchmail/branch_6.5/
  27. https://deac-ams.dl.sourceforge.net/project/fetchmail/branch_6.5/
  28. https://deac-fra.dl.sourceforge.net/project/fetchmail/branch_6.5/
  29. https://deac-riga.dl.sourceforge.net/project/fetchmail/branch_6.5/
  30. https://downloads.sourceforge.net/project/fetchmail/branch_6.5/
  31. https://excellmedia.dl.sourceforge.net/project/fetchmail/branch_6.5/
  32. https://freefr.dl.sourceforge.net/project/fetchmail/branch_6.5/
  33. https://gigenet.dl.sourceforge.net/project/fetchmail/branch_6.5/
  34. https://ixpeering.dl.sourceforge.net/project/fetchmail/branch_6.5/
  35. https://jaist.dl.sourceforge.net/project/fetchmail/branch_6.5/
  36. https://kumisystems.dl.sourceforge.net/project/fetchmail/branch_6.5/
  37. https://liquidtelecom.dl.sourceforge.net/project/fetchmail/branch_6.5/
  38. https://nchc.dl.sourceforge.net/project/fetchmail/branch_6.5/
  39. https://netactuate.dl.sourceforge.net/project/fetchmail/branch_6.5/
  40. https://netcologne.dl.sourceforge.net/project/fetchmail/branch_6.5/
  41. https://onboardcloud.dl.sourceforge.net/project/fetchmail/branch_6.5/
  42. https://phoenixnap.dl.sourceforge.net/project/fetchmail/branch_6.5/
  43. https://razaoinfo.dl.sourceforge.net/project/fetchmail/branch_6.5/
  44. https://sinalbr.dl.sourceforge.net/project/fetchmail/branch_6.5/
  45. https://sitsa.dl.sourceforge.net/project/fetchmail/branch_6.5/
  46. https://tenet.dl.sourceforge.net/project/fetchmail/branch_6.5/
  47. https://ufpr.dl.sourceforge.net/project/fetchmail/branch_6.5/
  48. https://versaweb.dl.sourceforge.net/project/fetchmail/branch_6.5/
Collapse this list.
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2024-11-04
    Affects: users of mail/fetchmail
    Author: chalpin@cs.wisc.edu
    Reason: 
      OPIE and RPA have been made optional because both have significant security
      problems. OPIE support was not provided by the port on 14.x until the update
      to 6.5.0, when it was briefly re-activated. Because of its security flaws, it
      has now been disabled by default on both 13.x and 14.x.
    
      RPA is currently enabled by default, but this will change in a future update.
    
    
Expand this list (1 items)
  • 2023-02-10
    Affects: users of mail/fetchmail
    Author: fernape@FreeBSD.org
    Reason: 
      Fetchmail now warns about OpenSSL before 1.1.1s or 3.0.7, and rejects wolfSSL
      older than 5.5.1.
    
    
  • Collapse this list.

Number of commits found: 244 (showing only 100 on this page)

«  1 | 2 | 3  »  

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
6.3.21_1
27 Aug 2012 17:44:23
Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Update fetchmail to 6.3.21_1, fixing CVE-2012-3482.
Adjust VuXML database entry from < 6.3.22 to < 6.3.21_1.

PR:		ports/170613
Approved by:	maintainer timeout (14 days)
Security:	http://www.vuxml.org/freebsd/83f9e943-e664-11e1-a66d-080027ef73ec.html
Security:	CVE-2012-3482
6.3.21
24 Feb 2012 23:56:18
Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Update 6.3.20 --> 6.3.21

PR:             165459
Approved by:    Maintainer (Corey Halpin <chalpin@cs.wisc.edu>)
6.3.20_2
14 Jan 2012 08:57:23
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
In the rc.d scripts, change assignments to rcvar to use the
literal name_enable wherever possible, and ${name}_enable
when it's not, to prepare for the demise of set_rcvar().

In cases where I had to hand-edit unusual instances also
modify formatting slightly to be more uniform (and in
some cases, correct). This includes adding some $FreeBSD$
tags, and most importantly moving rcvar= to right after
name= so it's clear that one is derived from the other.
6.3.20_2
23 Sep 2011 22:26:39
Original commit files touched by this commit This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Add LDFLAGS to CONFIGURE_ENV and MAKE_ENV (as it was done with LDFLAGS)
- Fix all ports that add {CPP,LD}FLAGS to *_ENV to modify flags instead

PR:             157936
Submitted by:   myself
Exp-runs by:    pav
Approved by:    pav
6.3.20_2
21 Aug 2011 14:03:18
Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Fix critical fetchmail-embeds-NULs bug found by Antoine Levitt.
6.3.20_1
15 Aug 2011 20:43:57
Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Forced commit to note that the creation of /var/run/fetchmail
got broken as undesired side effect of this fix when pkg-install
was removed.  Regression fixed with previous commit.

PR:           ports/157613
Submitted by: crees
6.3.20_1
15 Aug 2011 20:13:22
Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Assorted minor fixes and touch-ups:

- Fix:     rcfile: export FETCHMAILUSER=$fetchmail_user [1]

- Fix:     when installing from source, make /var/run/fetchmail directory
           so that a global fetchmail installation won't break after port
           upgrades

- Change:  compile GSSAPI support by default (it's in base)

- Cleanup: rcfile: drop support for fetchmail.sh script name

- Cleanup: rcfile: don't mix backtick with apostrophe in comments, they don't
           match

Reported by:  thierry, Victor Balada Diaz <victor@bsdes.net> [1]
Suggested by: Victor Balada Diaz <victor@bsdes.net> [1]
PR:           ports/151783
Approved by:  maintainer timeout [1]
6.3.20
09 Jul 2011 10:07:49
Original commit files touched by this commit This port version is marked as vulnerable.
crees search for other commits by this committer
Use USERS and GROUPS

PR:             ports/157613
Submitted by:   crees (me)
Approved by:    rene (mentor, implicit), Corey Halpin (maintainer)
6.3.20
06 Jun 2011 14:54:42
Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Security update to new upstream release 6.3.20.
Changes:    
http://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=18583
Security:    CVE-2011-1947
            
http://www.vuxml.org/freebsd/f7d838f2-9039-11e0-a051-080027ef73ec.html
Approved by: Corey Halpin (maintainer)
PR:          ports/157661
6.3.19
11 Dec 2010 22:27:06
Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream release 6.3.19.

Approved by:  Corey Halpin (maintainer)
Submitted by: mandree
PR:           ports/152999
6.3.18
14 Nov 2010 15:44:43
Original commit files touched by this commit This port version is marked as vulnerable.
rene search for other commits by this committer
Fix build by skipping the validation of the XHTML 1.1 document
Mailbox-Names-UTF7.html

PR:             ports/152067
Submitted by:   Matthias Andree [matthias.andree gmx.de]
Approved by:    maintainer
6.3.18
25 Oct 2010 07:15:38
Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream release 6.3.18.

Approved by: Corey Halpin (maintainer)
PR: ports/151686
6.3.17_3
20 Oct 2010 14:39:42
Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Correct previous commit
- Bump PORTREVISION

Reported by:    Alexander Milanov <a@amilanov.com>
Approved by:    pgollucci (mentor, implicit)
6.3.17_2
19 Oct 2010 08:07:39
Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Change PREFIX/etc/fetchmailrc.sample permission from 644 to 600
- Bump PORTREVISION

PR:             ports/151515
Submitted by:   Alexander Milanov <a@amilanov.com>
Approved by:    Corey Halpin <chalpin@cs.wisc.edu> (maintainer), pgollucci
(mentor, implicit)
6.3.17_1
31 May 2010 02:01:56
Original commit files touched by this commit This port version is marked as vulnerable.
ade search for other commits by this committer
Bounce PORTREVISION for gettext-related ports.  Have fun, ya'll.
6.3.17
23 May 2010 14:40:19
Original commit files touched by this commit This port version is marked as vulnerable.
sylvio search for other commits by this committer
- Fix when run fetchmail with apop access.

PR:             ports/146002
Submitted by:   mkgt00@gmail.com
Approved by:    maintainer (timeout > 14days)
6.3.17
22 May 2010 04:36:31
Original commit files touched by this commit This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 6.3.17

PR:             146589
Submitted by:   Corey Halpin <chalpin@cs.wisc.edu> (maintainer)
6.3.16_1
22 Apr 2010 19:13:24
Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Security fix for CVE-2010-1167.

This unbreaks the build, since this vulnerability is listed
at http://www.vuxml.org/freebsd/09910d76-4c82-11df-83fb-0015587e2cc1.html.

Add the recommended upstream patch.

Bump PORTREVISION.

PR: ports/145857
Approved by: Corey Halpin (maintainer)
Approved by: garga (mentor)
6.3.16
07 Apr 2010 18:20:20
Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream version.

Approved by: Corey Halpin (maintainer)
Approved by: garga@ (mentor)
6.3.15
02 Apr 2010 18:49:00
Original commit files touched by this commit This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 6.3.14

PR:             145298
Submitted by:   Corey Halpin <chalpin@cs.wisc.edu> (maintainer)
6.3.15
27 Mar 2010 00:15:24
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Begin the process of deprecating sysutils/rc_subr by
s#. %%RC_SUBR%%#. /etc/rc.subr#
6.3.14
12 Feb 2010 09:54:07
Original commit files touched by this commit This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream release 6.3.14. Changes:

# SECURITY FIXES
* SSL/TLS certificate information is now also reported properly on computers
  that consider the "char" type signed. Fixes malloc() buffer overrun.
  Workaround for older versions: do not use verbose mode.  CVE-2010-0562
  See fetchmail-SA-2010-01.txt for details, including a minimal patch.

# BUG FIXES
* The IMAP client no longer skips messages from several IMAP servers including
  Dovecot if fetchmail's "idle" is in use.  Causes were that fetchmail (a)
  ignored some untagged responses when it should not (b) relied on EXISTS
  messages in response to EXPUNGE, which aren't mandated by RFC-3501 (the IMAP
  standard) and aren't sent by Dovecot either.
    Fix by Sunil Shetye (the fix also consolidates IMAP response handling,
(Only the first 15 lines of the commit message are shown above View all of this commit message)
6.3.13
04 Nov 2009 10:47:33
Original commit files touched by this commit This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 6.3.13 (updates translations and supports SMTP multiline replies)
- Remove Kerberos IV support, insecure and obsolete
- Mark BROKEN if KRB5_HOME is set and invalid
- Kill pre-configure, no longer needed
- Kill obsolete POP2 from make config menu, still available if given on make
  command line
- Auto-detect KRB5_HOME if it's $LOCALBASE or /usr
- MARK_JOBS_SAFE=yes
- Cease messing with @cwd in pkg-plist
- Reduce asterisks on pkg-message.in, to avoid screen clutter on long $PREFIX
  Rely on krb-config instead.

PR:             140100
Submitted by:   Matthias Andree <matthias.andree@gmx.de>
Approved by:    maintainer
6.3.11_1
08 Sep 2009 15:12:21
Original commit files touched by this commit This port version is marked as vulnerable.
wxs search for other commits by this committer
- Add a patch to fix segfault on startup.

PR:             ports/137972
Submitted by:   Christian Ludwig <chrissicool@chrissicool.net>
Approved by:    Corey Halpin <chalpin@cs.wisc.edu> (maintainer)
6.3.11
11 Aug 2009 15:27:11
Original commit files touched by this commit This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Update to 6.3.11

PR:             137604
Submitted by:   Corey Halpin <chalpin@cs.wisc.edu> (maintainer)
http://www.freebsd.org/ports/portaudit/5179d85c-8683-11de-91b9-0022157515b2.html
6.3.10
15 Jul 2009 23:02:52
Original commit files touched by this commit This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Update to 6.3.10
- Portlint

PR:             136774
Submitted by:   Corey Halpin <chalpin@cs.wisc.edu> (maintainer)
6.3.9
04 May 2009 23:09:15
Original commit files touched by this commit This port version is marked as vulnerable.
miwi search for other commits by this committer
- Pass maintainership to submitter

PR:             134189
Submitted by:   Corey Halpin <chalpin@cs.wisc.edu> (maintainer)
6.3.9
23 Mar 2009 01:01:15
Original commit files touched by this commit This port version is marked as vulnerable.
linimon search for other commits by this committer
Reset barner@FreeBSD.org due to several months of inactivity.

Hat:            portmgr
6.3.9
12 Jan 2009 00:59:27
Original commit files touched by this commit This port version is marked as vulnerable.
linimon search for other commits by this committer
Add http://homepages.uni-paderborn.de to MASTER_SITES.  The sunsite
mirrors appear to be behind.  Also (temporarily?) remove home.leo.org,
as the site seems to have been rearranged.

PR:             ports/130301
Submitted by:   Matthias Andree <matthias dot andree at gmx dot de>
Hat:            portmgr
6.3.9
08 Jan 2009 12:12:44
Original commit files touched by this commit This port version is marked as vulnerable.
pav search for other commits by this committer
- Update to 6.3.9

PR:             ports/129755
Submitted by:   Matthias Andree <matthias.andree@gmx.de>
Approved by:    maintainer timeout (barner; 20 days)
6.3.8_7
21 Aug 2008 06:18:49
Original commit files touched by this commit This port version is marked as vulnerable.
rafan search for other commits by this committer
Update CONFIGURE_ARGS for how we pass CONFIGURE_TARGET to configure script.
Specifically, newer autoconf (> 2.13) has different semantic of the
configure target. In short, one should use --build=CONFIGURE_TARGET
instead of CONFIGURE_TARGET directly. Otherwise, you will get a warning
and the old semantic may be removed in later autoconf releases.

To workaround this issue, many ports hack the CONFIGURE_TARGET variable
so that it contains the ``--build='' prefix.

To solve this issue, under the fact that some ports still have
configure script generated by the old autoconf, we use runtime detection
in the do-configure target so that the proper argument can be used.

Changes to Mk/*:
 - Add runtime detection magic in bsd.port.mk
(Only the first 15 lines of the commit message are shown above View all of this commit message)
6.3.8_7
01 Jul 2008 16:35:50
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Use revised patch for CVE-2008-2711
- Bump port revision

Security:       http://fetchmail.berlios.de/fetchmail-SA-2008-01.txt
Security:      
http://www.vuxml.org/freebsd/1e8e63c0-478a-11dd-a88d-000ea69a5213.html
6.3.8_6
20 Jun 2008 07:46:50
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Security fix: potential crash in -v -v verbose mode.
- Bump port revision

PR:             ports/124718
Submitted by:   Matthias Andree <matthias.andree@gmx.de>
Security:      
http://www.vuxml.org/freebsd/168190df-3e9a-11dd-87bc-000ea69a5213.html
Security:       CVE-2008-2711
6.3.8_5
06 Jun 2008 13:43:09
Original commit files touched by this commit This port version is marked as vulnerable.
edwin search for other commits by this committer
Bump portrevision due to upgrade of devel/gettext.

The affected ports are the ones with gettext as a run-dependency
according to ports/INDEX-7 (5007 of them) and the ones with USE_GETTEXT
in Makefile (29 of them).

PR:             ports/124340
Submitted by:   edwin@
Approved by:    portmgr (pav)
6.3.8_4
06 Apr 2008 09:08:28
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Fix installation as non-root user

Submitted by:   Stefan Sperling
PR:             ports/122269
6.3.8_4
04 Oct 2007 01:49:29
Original commit files touched by this commit This port version is marked as vulnerable.
edwin search for other commits by this committer
Remove always-false/true conditions based on OSVERSION 500000
6.3.8_4
03 Sep 2007 19:22:28
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Fix for CVE-2007-4565 [1]
- Manually include bsd.python.mk if WITH_X11 is set (after bsd.port.pre.mk) [2]

Security:      
http://www.vuxml.org/freebsd/45500f74-5947-11dc-87c1-000e2e5785ad.html
Security:       http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt
Submitted by:   Matthias Andree <matthias.andree@gmx.de> [1]
PR:             ports/116011 [1]
Submitted by:   Jacula Modyun <jacula@gmail.com> [2]
PR:             ports/115714 [2]
6.3.8_3
13 Aug 2007 14:31:54
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- security/ca-roots is deprecated, switch to security/ca_roots_nss for
  SSL certificates.
6.3.8_3
23 Jul 2007 09:36:52
Original commit files touched by this commit This port version is marked as vulnerable.
rafan search for other commits by this committer
- Set --mandir and --infodir in CONFIGURE_ARGS if the configure script
  supports them.  This is determined by running ``configure --help'' in
  do-configure target and set the shell variable _LATE_CONFIGURE_ARGS
  which is then passed to CONFIGURE_ARGS.
- Remove --mandir and --infodir in ports' Makefile where applicable
  Few ports use REINPLACE_CMD to achieve the same effect, remove them too.
- Correct some manual pages location from PREFIX/man to MANPREFIX/man
- Define INFO_PATH where necessary
- Document that .info files are installed in a subdirectory relative to
  PREFIX/INFO_PATH and slightly change add-plist-info to use INFO_PATH and
  subdirectory detection.

PR:             ports/111470
Approved by:    portmgr
Discussed with: stas (Mk/*), gerald (info related stuffs)
Tested by:      pointyhat exp run
6.3.8_3
22 Jul 2007 11:20:19
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Actually respect the `fetchmail_user' variable in single daemon
  mode
- Document that above variable is ignored in the per-user daemon mode
- Bump port revision

Requested by:   Graham Menhennitt <graham@menhennitt.com.au>
PR:             ports/114701
6.3.8_2
06 Jul 2007 07:10:44
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Remove circular dependency in rcorder by removing the (unnessary) constraint
  that fetchmail is started "BEFORE LOGIN". "REQUIRE mail" (which in turn
  requires LOGIN) is enough.
- Bump PORTREVISION

PR:             ports/114294
Submitted by:   Alson van der Meulen <alson@flutnet.org>
6.3.8_1
06 Jun 2007 19:37:23
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
Install fetchmailrc with 640 since it may contain passwords.
The fetchmailrc.sample file is still installed 644.
6.3.8_1
31 May 2007 20:09:30
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Add pkg-message pointing to documenation in rc script.
- Add pointers to fetchmail documentation to rc script.
6.3.8_1
31 May 2007 20:08:45
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Add pkg-message pointing to documenation in rc script.
- Add pointers to fetchmail documentation to rc script.
6.3.8_1
19 May 2007 20:32:57
Original commit files touched by this commit This port version is marked as vulnerable.
flz search for other commits by this committer
- Welcome X.org 7.2 \o/.
- Set X11BASE to ${LOCALBASE} for recent ${OSVERSION}.
- Bump PORTREVISION for ports intalling files in ${X11BASE}.
6.3.8
10 Apr 2007 19:37:00
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Make fetchable
- Remove home.pages.de master site
- Add sunsite mirror

PR:             ports/111443
Submitted by:   Matthias Andree
6.3.8
10 Apr 2007 14:10:12
Original commit files touched by this commit This port version is marked as vulnerable.
rafan search for other commits by this committer
- Fix fetch, MASTER_SITE_BERLIOS already contains %SUBDIR%
6.3.8
09 Apr 2007 20:04:05
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to 6.3.8
- Fix insecure APOP authentication (minor)

Security: http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt
Security: http://www.vuxml.org/freebsd/f1c4d133-e6d3-11db-99ea-0060084a00e5.html
ChangeLog:
https://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=12610
6.3.7
20 Feb 2007 08:13:17
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to 6.3.7
- Regression fixes for KPOP and repoll after server disconnect (TLS)
  Details:
https://lists.berlios.de/pipermail/fetchmail-announce/2007-February/000047.html
6.3.6
06 Jan 2007 14:38:43
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to 6.3.6
- Fixes two security issues, one of which is a longstanding password disclosure
bug.
- Several robustness fixes and other improvements

Release notes: 
https://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=11977
Security:      
http://www.vuxml.org/freebsd/5238ac45-9d8c-11db-858b-0060084a00e5.html
Security:      
http://www.vuxml.org/freebsd/37e30313-9d8c-11db-858b-0060084a00e5.html
Reported by:    Matthias Andree (upstream author)
6.3.5
02 Nov 2006 16:05:29
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to fetchmail 6.3.5. See here for the release notes:
 
http://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=11358
- OPTIONize [1]
- GSSAPI support (requires Kerberos). [1]
- Removed POP2 from port's default configuration [1]

Requested by:   Stefan Thurner <thurners@nicsys.de> [1]
6.3.4_3
30 Aug 2006 11:56:13
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Add new rc.conf option "fetchmail_logging_facility" which can be used
  to specify where fetchmail logs to. Default: --syslog (as hardcoded
  before). [1]
- Use marco for cp [2]
- Try to remove directories not listed in mtree [2]
- No portrevision bump since the default behaviour remains the same, and
  a new fetchmail version is to be exspected soon anyway.

Requested by:   Gerard Seibert <gerard@seibercom.net> [1]
Submitted by:   Stanislav Sedov <ssedov@mbsd.msk.ru> [2]
PR:             ports/101517
6.3.4_3
26 May 2006 22:18:57
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
Make prefix clean.

PR:                     ports/97977
Submitted by:           Esa Karkkainen <ejk@iki.fi>
Big shiny pointy hat:   me
6.3.4_2
25 May 2006 16:26:50
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Use %%RC_SUBR%% [1]
- Fix typo in Makefile [1]
- Fix recursive calls of rc script on older systems (requested in [2])
- Bump PORTREVISION

PR:                     97876 [1], 97335 [2]
Submitted by:           Jeremy Chadwick <freebsd@jdc.parodius.com> [1],
                        Veselin Slavov <vess@slavof.net> [2]
6.3.4_1
15 May 2006 21:18:40
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Fix PID file for system-wide daemon mode
- Fix package: Create /var/run/fetchmail in pkg-install instead of
  post-install target.
- Bump PORTREVISION

PR:             ports/97283
Submitted by:   Martin Jackson <mhjacks@swbell.net>
6.3.4
12 May 2006 16:58:48
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to 6.3.4 [1]
- Add rcNG script. See $PREFIX/etc/rc.d/fetchmail for
  instructions. Inspired by [2] and ports/www/apache22.

PR:             ports/96987 [1], ports/96079
Submitted by:   Rob MacGregor <freebsd.macgregor@blueyonder.co.uk> [1],
                Martin Jackson <mhjacks@swbell.net>
6.3.4
10 May 2006 22:37:39
Original commit files touched by this commit This port version is marked as vulnerable.
edwin search for other commits by this committer
Remove USE_REINPLACE from ports starting with M
6.3.2_1
30 Jan 2006 12:47:53
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Prevent fetchmail from crashing if the .netrc file does not contain
  a password for a particular account.

- Bump PORTREVISION

Submitted by:   Craig Leres via Matthias Andree
6.3.2
23 Jan 2006 15:14:28
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to 6.3.2
- Changes:
  * Fixes a denial of service bug/fetchmail crash after sending a bounce
  * Adds a Maillennium (Comcast) workaround
  * ChangeLog:
https://lists.berlios.de/pipermail/fetchmail-announce/2006-January/000022.html
Security:       http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt
Security:       CVE-2006-0321
Security:      
http://www.vuxml.org/freebsd/f11d3b22-88c6-11da-a7b2-0060084a00e5.html
6.3.1
19 Dec 2005 15:21:53
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
Update to 6.3.1

 * Fix null pointer dereference w/ headerless message in
   multi-drop mode [1]
 * Removed patches are in the upstream distribution now
 * ChangeLog:
https://lists.berlios.de/pipermail/fetchmail-announce/2005-December/000017.html

Security: http://www.vuxml.org/freebsd/f7eb0b23-7099-11da-a15c-0060084a00e5.html
Security: http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt
Security: CVE-2005-4348
6.3.0_3
11 Dec 2005 21:24:18
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Fix a null pointer dereference in multi-drop mode [1]
- Fix packaging if python is not present at compile time [2]
- Sort targets in Makefile
- Fix variable in the WITH_X11 case
- Bump PORTREVISION (for [1])

Submitted by:   Andreas Haakh <bugReporter@Haakh.de> [1]
Reviewed by:    Matthias Andree <matthias.andree@gmx.de>
                (upstream maintainer) [1]
Reported by:    pointyhat via kris [2]
6.3.0_2
10 Dec 2005 19:58:31
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Add RUN_DEPENDS on security/ca-roots, so the certificate check really
  succeeds (if the servers certificate is signed by one of those authorites)

- Bump PORTREVISON, since a failing certiciate check spams the port users'
  maillog.
6.3.0_1
10 Dec 2005 16:09:13
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Use USE_OPENSSL [1]
- Remove obsolete --enable-inet6 configure argument [1]
- Don't try to enable Kerberos IV and V at the same time [1]
- Add WITH_NTLM knob. Inform port user about other knobs
  (WITH_X11, WITHOUT_NLS) [1]
- Correct man page patch [1]
- Fix default OpenSSL certificate path [1] [2]
- Fix plist [1] [3]
- Bump PORTREVISON

Submitted by:   Matthias Andree <matthias.andree@gmx.de> [1]
Reported by:    Dieter Rauschenberger <dr@d-ra.de> [2]
PR:             ports/90084 [2]
Reported by:    kris via pointyhat [3]
6.2.5.2_4
06 Dec 2005 21:08:15
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to fetchmail 6.3.0
- From the announcement:

  fetchmail 6.3.0 has been released on 2005-11-30. More than two years
  after the previous formal 6.2.5 release, this collects several dozen
  bug fixes, documentation, portability and IPv6 improvements and marks
  the beginning of a new "stable" 6.3.X branch that will not change,
  except for bug fixes and documentation updates.

- files/patch-pop2.c contributed by Stanislav Brabec <sbrabec@suse.cz>
  via Matthias Andree <matthias.andree@gmx.de> (upstream maintainer)
6.3.0
06 Dec 2005 21:07:19
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to fetchmail 6.3.0
- From the announcement:

  fetchmail 6.3.0 has been released on 2005-11-30. More than two years
  after the previous formal 6.2.5 release, this collects several dozen
  bug fixes, documentation, portability and IPv6 improvements and marks
  the beginning of a new "stable" 6.3.X branch that will not change,
  except for bug fixes and documentation updates.

- files/patch-pop2.c contributed by Stanislav Brabec <sbrabec@suse.cz>
  via Matthias Andree <matthias.andree@gmx.de> (upstream maintainer)
6.2.5.2_4
24 Nov 2005 14:08:01
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
Add SHA256 for my ports (that don't already have it).
6.2.5.2_4
14 Nov 2005 11:48:53
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Fix a bug introduced with fetchmail-6.2.5.2_3, where it would sometimes
  leave some messages on an IMAP server, i.e. this is the correct fix
  for the following bug (as described Makefile:1.161 and
  files/patch-imap.c:1.1):

  fix IMAP client timeout bug with upstream servers that do not send updated
  EXISTS counts after acknowledging EXPUNGE see <http://bugs.debian.org/314509>

- Bump PORTREVISION to 4

PR:                     ports/88850
Submitted by:           Vasil Dimov
Patch provided by:      Matthias Andree (upstream maintainer)
Patch tested by:        barner, Vasil Dimov
6.2.5.2_3
10 Nov 2005 16:30:32
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
Add private backup master site.

Requested by:   Diane Bruce <db@db.net>
PR:             ports/88787
6.2.5.2_3
10 Nov 2005 10:29:33
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- fix IMAP client timeout bug with upstream servers that do not send updated
  EXISTS counts after acknowledging EXPUNGE see <http://bugs.debian.org/314509>

- add fetchmailconf wrapper check for _tkinter.so (if python was installed but
  not Tkinter, the wrapper would still try to run fetchmailconf.bin, which
  gives a less clear error message to the user than was intended)

- let fetchmailconf wrapper pass command line arguments to fetchmailconf.bin
  (it supports -d and -f FILE)

- replace PREFIX with LOCALBASE where appropriate

- bump PORTREVISION

Submitted by:   Matthias Andree <matthias.andree@gmx.de>
PR:             ports/88444
6.2.5.2_1
30 Oct 2005 23:05:07
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
Don't indent comment added in last commit by one tab, so it is not printed.
6.2.5.2_1
30 Oct 2005 19:06:46
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Use fetchmailconf-1.43.2 in order to fix a password exposure caused by
  insecure file creation.

- While here, move berlios.de to the top of the MASTERSITEs, since
  development takes place there.

- Bump PORTREVISION

Security:       CVE-2005-3088
Security:       http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt
6.2.5.2
28 Jul 2005 13:41:18
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
Fix Kerberos {IV, V} detection.
6.2.5.2
23 Jul 2005 18:47:36
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
Update WWW (new fetchmail homepage fetchmail.berlios.de).

PR:             ports/83900
Submitted by:   Matthias Andree <matthias.andree@gmx.de>
6.2.5.2
22 Jul 2005 07:07:14
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
Forced commit to note the following (this also applies for the following files
removed in my earlier commit:

        files/patch-s1
        files/patch-r1
        files/patch-driver.c

Submitted by:   Matthias Andree <matthias DOT andree AT gmx DOT de>
Discovered by:  Miloslav Trmac
http://lists.berlios.de/pipermail/fetchmail-devel/2005-July/000397.html
New fix by:     Ludwig Nussel (SuSE security)
6.2.5.2
22 Jul 2005 06:59:44
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to 6.2.5.2. This fixes a denial of service vulerability introduced
  in version 6.2.5.1

- Use distribution patch from fetchmail.berlios.de instead of keeping the
  security fix in CVS (-> remove patch-r1, patch-s1 which contained to
  update from 6.2.5 to 6.2.5.1).

- The above patch also contains a patch that we kept locally in
  patch-driver.c: This one has been removed, too.
6.2.5.1
21 Jul 2005 10:25:33
Original commit files touched by this commit This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to 6.2.5.1 (security update!)
- Add new master site
- Take maintainership (no objections on freebsd-ports,
  Matthias also favours this option as long as the new FreeBSD
  maintainer will be responsive and submit patches upstream - promissed :-)

Submitted by:   Matthias Andree <matthias DOT andree AT gmx DOT de>
PR:             ports/83805
Obtainted from: http://download.berlios.de/fetchmail/fetchmail-patch-6.2.5.1.gz
Security:      
http://www.vuxml.org/freebsd/3497d7be-2fef-45f4-8162-9063751b573a.html
6.2.5_2
18 Jul 2005 03:49:55
Original commit files touched by this commit This port version is marked as vulnerable.
linimon search for other commits by this committer
With portmgr hat on, reset eik's ports since he has been inactive for
several months (not responding to email).

Discussed among:        portmgr team
6.2.5_2
12 Apr 2005 03:26:57
Original commit files touched by this commit This port version is marked as vulnerable.
obrien search for other commits by this committer
At Kris's request, back out the MACHINE_ARCH spelling correction until
after 5.4-RELEASE.
6.2.5_2
11 Apr 2005 08:04:41
Original commit files touched by this commit This port version is marked as vulnerable.
obrien search for other commits by this committer
Assist getting more ports working on AMD64 by obeying the
Ports Collection documentation and use 'ARCH' rather than 'MACHINE_ARCH'.
6.2.5_2
28 Apr 2004 17:26:35
Original commit files touched by this commit This port version is marked as vulnerable.
eik search for other commits by this committer
- fix POP bug [1]
- add WITHOUT_NLS [2]

Seems like 6.2.6 takes a while...

PR:             60262 [1], 62732 [2]
Submitted by:   Stuart Barkley <stuartb@4gh.net> [1]
                Katsura Matsumoto <katsura@cc.osaka-kyoiku.ac.jp> [1]
6.2.5_1
18 Mar 2004 01:04:31
Original commit files touched by this commit This port version is marked as vulnerable.
eik search for other commits by this committer
SIZEify

Prompted by:    trevor
6.2.5_1
04 Feb 2004 04:36:30
Original commit files touched by this commit This port version is marked as vulnerable.
marcus search for other commits by this committer
Add USE_GETTEXT and bump PORTREVISION.

Submitted by:   trevor
Tested by:      bento
6.2.5
23 Jan 2004 18:12:26
Original commit files touched by this commit This port version is marked as vulnerable.
trevor search for other commits by this committer
Now gettext 0.12.1 is gettext-old.
6.2.5
16 Nov 2003 22:15:28
Original commit files touched by this commit This port version is marked as vulnerable.
eik search for other commits by this committer
Try some new fetchmail mirrors

Noticed by:     Bill Fenner's portsurvey
Approved by:    marcus (mentor)
6.2.5
14 Nov 2003 00:29:48
Original commit files touched by this commit This port version is marked as vulnerable.
eik search for other commits by this committer
switch my ports to my FreeBSD address

Approved by:    marcus (mentor)
6.2.5
24 Oct 2003 09:33:14
Original commit files touched by this commit This port version is marked as vulnerable.
sergei search for other commits by this committer
- Update to 6.2.5 (see http://catb.org/~esr/fetchmail/NEWS for details)
- Use DOCSDIR macro in pkg-plist
- Don't install yet another copy of GPL
- Pass maintainership to Oliver Eikemeier

PR:             58283, 58341
Submitted by:   Oliver Eikemeier <eikemeier@fillmore-labs.com>,
                Esa Karkkainen <ejk@iki.fi>
Approved by:    Ville Eerola <ve@sci.fi> (previous maintainer),
                krion (implicit)
6.2.4_1
09 Sep 2003 03:26:24
Original commit files touched by this commit This port version is marked as vulnerable.
silby search for other commits by this committer
Update fetchmail port to 6.2.4
6.2.2_1
26 Aug 2003 20:25:58
Original commit files touched by this commit This port version is marked as vulnerable.
marcus search for other commits by this committer
Bump the PORTREVISION for the ports directly affected by the gettext upgrade.

Prodded by:     kris
6.2.2
25 Aug 2003 05:41:38
Original commit files touched by this commit This port version is marked as vulnerable.
marcus search for other commits by this committer
Chase the libintl.so shared lib version.
6.2.2
01 Jul 2003 11:33:38
Original commit files touched by this commit This port version is marked as vulnerable.
daichi search for other commits by this committer
update mail/fetchmail: 6.2.0 --> 6.2.2

PR:             53280
Submitted by:   Oliver Eikemeier <eikemeier@fillmore-labs.com>
6.2.0
01 Mar 2003 13:04:27
Original commit files touched by this commit This port version is marked as vulnerable.
sf search for other commits by this committer
track ESR's page.

www.tuxedo.org -> www.catb.org
6.2.0
21 Feb 2003 12:42:26
Original commit files touched by this commit This port version is marked as vulnerable.
knu search for other commits by this committer
De-pkg-comment.
6.2.0
13 Dec 2002 14:05:36
Original commit files touched by this commit This port version is marked as vulnerable.
nectar search for other commits by this committer
Upgrade to 6.2.0, primarily to fix YET ANOTHER remotely exploitable
vulnerability.  That's at least four, but who's counting?
<URL:http://security.e-matters.de/advisories/052002.html>
6.1.2
05 Nov 2002 10:01:56
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Update to 6.1.2, released 10/31. It's a very simple bugfix upgrade.

PR:             ports/44830
Submitted by:   Matthias Andree <matthias.andree@web.de>
6.1.1
31 Oct 2002 14:54:22
Original commit files touched by this commit This port version is marked as vulnerable.
naddy search for other commits by this committer
This port update fixes the pkg-plist to include the new localizations so they
are included in the package, and it contains many upstream bugfixes, installs
the NEWS documentation file. These are the upstream fixes:

* OTP fix patches from Stanislav Brabec <utx@penguin.cz>
* fix patch for writing antispam capability correctly in conf.c.
* Fix patches for Debian bugs #162571, #156592.
* Correction to manpage re -b and qmail.
* Patch to disable use of STLS if auth passwd is specified.
* Fix specfile generation to handle SSL correctly.
* New Danish, Turkish, and Catalan translation files.
* Improved ODMR debug messages.
* IMAP efficiency hack; don't fetch sizes unless needed.
* Detect and rewrite invalid return paths beginning with @.
* Fix for subtle freeing bug that suppressed information in some bounce msgs.
* Newline fix patches for internationalization files.
* Fix reversed test guarding authentication-failure warnings.
* Fix POP3 breakage starting at 5.9.14.

PR:             44330
Submitted by:   Matthias Andree <matthias.andree@web.de>
6.1.0
30 Sep 2002 09:04:34
Original commit files touched by this commit This port version is marked as vulnerable.
ijliao search for other commits by this committer
dont remove locale/* dirs
6.1.0
29 Sep 2002 18:23:32
Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Update 5.9.13 --> 6.1.0. Fixes yet another buffer overflow (exploit)
described at http://security.e-matters.de/advisories/032002.html.

Approved by:    nectar (using his security-officer hat)
                will (using his portmgr hat)
                As we are so close to last tagging, as suggested by
                portmgr, maintainer approval is forgone.
5.9.13
29 Sep 2002 15:20:30
Original commit files touched by this commit This port version is marked as vulnerable.
nectar search for other commits by this committer
Mark FORBIDDEN due to another buffer overflow.
http://security.e-matters.de/advisories/032002.html

  % cvs rlog ports/mail/fetchmail/Makefile | grep 'exploit' | wc
         3      28     203
5.9.13
22 Aug 2002 02:05:28
Original commit files touched by this commit This port version is marked as vulnerable.
kevlo search for other commits by this committer
Update to version 5.9.13

PR: 41623
Submitted by:    Esa Karkkainen <ejk@iki.fi>
5.9.11
01 Aug 2002 16:22:41
Original commit files touched by this commit This port version is marked as vulnerable.
ade search for other commits by this committer
Chase shlib rev of devel/gettext

Submitted by:   lots and lots
Pointy hat to:  ade

Number of commits found: 244 (showing only 100 on this page)

«  1 | 2 | 3  »