Date: Sat, 05 Mar 2022 16:38:44 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 262362] mail/fetchmail: update to 6.4.28 Message-ID: <bug-262362-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D262362 Bug ID: 262362 Summary: mail/fetchmail: update to 6.4.28 Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Keywords: patch Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: mandree@FreeBSD.org CC: chalpin@cs.wisc.edu CC: chalpin@cs.wisc.edu Flags: maintainer-feedback?(chalpin@cs.wisc.edu) Attachment #232267 maintainer-approval?(chalpin@cs.wisc.edu) Flags: Flags: merge-quarterly? Created attachment 232267 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D232267&action= =3Dedit mail/fetchmail: update to 6.4.28 BREAKING CHANGES: * Bump wolfSSL minimum required version to 5.1.1 to pull in security fix. FIXES: * When using wolfSSL 5.0.0, work around a bug that appears to hit wolfSSL w= hen receiving handshake records while still in SSL_peek(). Workaround is to r= ead 1 byte and cache it, then call SSL_peek() again. This affects only some TLS 1.3 servers.=20 https://github.com/wolfSSL/wolfssl/issues/4593 TRANSLATIONS: language translations were updated by this fine people: * es: Cristian Oth=C3=B3n Mart=C3=ADnez Vera [Spanish] * ro: Remus-Gabriel Chelu [Romanian] * sr: =D0=9C=D0=B8=D1=80=D0=BE=D1=81=D0=BB=D0=B0=D0=B2 =D0=9D=D0=B8=D0= =BA=D0=BE=D0=BB=D0=B8=D1=9B (Miroslav Nikoli=C4=87) [Serbian] --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-262362-7788>