forked from pool/fetchmail
79e260e2ae
- Update to 6.4.20: [bsc#1188875, CVE-2021-36386] * CVE-2021-36386: DoS or information disclosure in some configurations. When a log message exceeds c. 2 kByte in size, for instance, with very long header contents, and depending on verbosity option, fetchmail can crash or misreport each first log message that requires a buffer reallocation. fetchmail then reallocates memory and re-runs vsnprintf() without another call to va_start(), so it reads garbage. The exact impact depends on many factors around the compiler and operating system configurations used and the implementation details of the stdarg.h interfaces of the two functions mentioned before. OBS-URL: https://build.opensuse.org/request/show/909104 OBS-URL: https://build.opensuse.org/package/show/server:mail/fetchmail?expand=0&rev=117 |
||
---|---|---|
.gitattributes | ||
.gitignore | ||
fetchmail-6.3.8-smtp_errors.patch | ||
fetchmail-6.4.20.tar.xz | ||
fetchmail-6.4.20.tar.xz.asc | ||
fetchmail-add-contrib-fetchnmail-oauth2.py-token-acquisition-u.patch | ||
fetchmail-add-imap-oauthbearer-support.patch | ||
fetchmail-add-passwordfile-and-passwordfd-options.patch | ||
fetchmail-add-query_to64_outsize-utility-function.patch | ||
fetchmail-add-readme-oauth2-issue-27.patch | ||
fetchmail-bump-max-passwordlen-to-1bytes.patch | ||
fetchmail-chase-and-integrate-interface-change.patch | ||
fetchmail-FAQ-list-gmail-options-including-oauthbearer-and-app.patch | ||
fetchmail-give-each-ctl-it-s-own-copy-of-password.patch | ||
fetchmail-increase-max-password-length-to-handle-oauth-tokens.patch | ||
fetchmail-oauth2-c-calculate-and-pass-in-correct-buffer-size-to-to64frombits.patch | ||
fetchmail-re-read-passwordfile-on-every-poll.patch | ||
fetchmail-support-oauthbearer-xoauth2-with-pop3.patch | ||
fetchmail.changes | ||
fetchmail.exec | ||
fetchmail.keyring | ||
fetchmail.logrotate | ||
fetchmail.service | ||
fetchmail.spec | ||
fetchmail.sysusers | ||
fetchmail.tmpfiles | ||
sysconfig.fetchmail |