enhanced rule patterns, role-based smtp server, better character set support,
and most importantly, a fix for the DoS recently reported on bugtraq. There
are other fixes and improvements as well, check out the release notes for
more information.
* Usual round of patch re-generation
* Add a makefile.bsf fix and a patch for pine/strings.c not being able to
find utf8.h
Mostly simple version update, but apply some of the same fixes from c-client.
* Make some Makefile variables more... variable
* SSLTYPE update to match new c-client makefile
* Usual round of patch re-generation, but do some of the DRAC stuff in a
way that has a better chance of surviving the next software update.
* One hunk of patch-ah is now obsoleted
* Add a patch for mailutil/Makefile similar to the other Makfile patches
that fix c-client dependencies.
this too. :)
* Mostly a simple version update, although I tweaked a few things
* Make some Makefile variables more... variable
* SSLTYPE update to match new c-client makefile
* Remove a spurious variable from the port Makefile
* Tab'ify a couple places in patches that had to be regenerated anyway
The reason is strong. A quote from submitter:
In current state choose of native or nullmailer's
sendmail/mailq depends on order of paths in $PATH
instead of sysadmins choose. (/etc/mail/mail.conf in general case)
PR: ports/45152
Submitted by: "."@babolo.ru
After this patch, the action of piping mails out won't stop,
even if all of your mails were failed to deliver. Nullmailer
itself will keep throwing mails to smart relay as long as
there're incoming mails, no matter how broken the recipients
of the previous mails.
Still leave this port in FORBIDDEN state until I address
PR ports/45152
Obtained from: http://www.debian.org/security/2002/dsa-198
Noted by: Volker Stolz <stolz@i2.informatik.rwth-aachen.de>
1. add Text-Iconv into RUN_DEPENDS
2. replace suidperl with perl
Noticed by: Vitor de Matos Carvalho <vitor@softinfo.com.br>
Markus Wennrich <nick@schoko.org>
- move the manual to a proper location ($DOCSDIR
[/usr/X11R6/share/doc/sylpheed] instead of /usr/X11R6/share/sylpheed)
- install manual and faq only if NOPORTDOCS isn't specified
PR: 45654
Submitted by: maintainer
vulnerability.
No trojan, no privilege gain. Because nullmailer is not DSN aware,
it has nothing to do if the smart relay refuses to relay correctly.
Stopping itself in such condition is a bug, or not a proper feature.
On bugtraq, it's a vulnerability anyway.
From ChangeLog:
- Removed the possibility to use 'mailx', which was the
default: removal from the detectionn routines and Mail/Mailer/mail.pm.
Strongly suggested by [Sebastian Krahmer]
PR: ports/45266
Submitted by: Phil Pennock <pdp@nl.demon.net>