Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 12 Nov 2015 14:01:58 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 204500] [patch] [security] [new maintainer] mail/phpmailer: Update to 5.2.14 and become maintainer
Message-ID:  <bug-204500-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D204500

            Bug ID: 204500
           Summary: [patch] [security] [new maintainer] mail/phpmailer:
                    Update to 5.2.14 and become maintainer
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Keywords: patch
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs@FreeBSD.org
          Reporter: ports@toco-domains.de
          Keywords: patch

Created attachment 163055
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D163055&action=
=3Dedit
patch with update to 5.2.14 and maintainer change

Hello,

attached a patch to update the port to the current version 5.2.14. The upda=
te
fixes an security issue (which has no CVE).=20

While here i:
- corrected the github account to use
- fix the outdated link to the homepage in pkg-desc
- become new maintainer

portlint -C is fine.

poudriere test-builds are fine for:
9.3 amd64 + i386
10.1 amd64 + i386
10.2 amd64 + i386
11-current r290334 amd64 + i386

I did a basic runtime test. I use this lib in my own applications and they =
send
still emails after update. :D

Suggestion for commit message:

Log:
  mail/phpmailer: update 5.2.13 -> 5.2.14

  Changes:
  * 5.2.14 (2015-11-01)
   * Allow addresses with IDN (Internationalized Domain Name) in PHP 5.3+
   * Allow access to POP3 errors
   * Make all POP3 private properties and methods protected
   * SECURITY Fix vulnerability that allowed email addresses with line brea=
ks
(valid in RFC5322) to pass to SMTP, permitting message injection at the SMTP
level. Mitigated in both the address validator and in the lower-level SMTP
class.
   * Updated Brazilian Portuguese translations

   Submitted by: Torsten Z=C3=BChlsdorff <ports@toco-domains.de> (new maint=
ainer)

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-204500-13>