From patchwork Mon Jun 3 14:47:27 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 7838 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384 client-signature ECDSA (secp384r1) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4VtGmH4Hppz3wxV for ; Mon, 3 Jun 2024 14:47:43 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384 client-signature ECDSA (secp384r1) client-digest SHA384) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4VtGmF3DTXz1XC; Mon, 3 Jun 2024 14:47:41 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4VtGmF1vw8z33D7; Mon, 3 Jun 2024 14:47:41 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384 client-signature ECDSA (secp384r1) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4VtGmC0jt7z331F for ; Mon, 3 Jun 2024 14:47:39 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4VtGmB26M0z1Hm; Mon, 3 Jun 2024 14:47:38 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1717426058; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=5Rg6Q7Ix751FXy72uPB4Tuncx5X/ASF5A2dzCbPa68g=; b=eLU9Bbh33pYXkH/pBWcQSfHXGdKzD3s6A0DXFJ2xXW/mDOUbuRDCwv7m69jThihcWoHrTf gqfJfWUuztRH6vBQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1717426058; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=5Rg6Q7Ix751FXy72uPB4Tuncx5X/ASF5A2dzCbPa68g=; b=hI2gAeWWNq+naMGYDlkut138pcYMdaATruXWC+XH4HtcSasu4abdkOFOxOvXNwe0pzfvMN 0V683mLBSsb/buGEOeDIcfFl3X7eRUAPkEMgafEM7zBwBzoPnW561qdOD5Zgnk8vTRBKdj FzWJWipCjJ+GtIjR+PgHZUJ9jfuqCf5jWEhlbyLt9Sx5f1tv666E4VIaMCLVAup4e0cuWq C6D2rE/G6du3AQmxfWiz8xmO7ZqsYbMb+N/PPNiDgrigmdZ1rEQiPPTd/BVWzrQey7eWHR aySc424CMRPvf4FxVfhklVkXnRRAjrYlByIiq9sl+08EbEljsWumqaoDofztmw== From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH] fetchmail: Update to version 6.4.38 Date: Mon, 3 Jun 2024 16:47:27 +0200 Message-ID: <20240603144731.2620910-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Message-ID-Hash: DFQDUCBW7HBOVDIPLQCTQNYXU3XHCYCL X-Message-ID-Hash: DFQDUCBW7HBOVDIPLQCTQNYXU3XHCYCL X-MailFrom: adolf.belka@ipfire.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.8 Precedence: list List-Id: IPFire development talk Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: - Update from version 6.4.36 to 6.4.38 - Update of rootfile not required - Changelog 6.4.38 # BREAKING CHANGES: * Tighten OpenSSL and wolfSSL version requirements again. See README.SSL. Distributors providing older versions that they backport security fixes for may want to patch socket.c but remember to redirect support to your distribution's support channels. The fetchmail maintainer only supports functionally unmodified builds with publicly available SSL/TLS library versions. fetchmail will refuse to build against OpenSSL 1.0.2 older than 1.0.2u, or wolfSSL older than 5.6.2. It will warn about OpenSSL older than 3.0.9, or between 3.1.0 and 3.1.4, or wolfSSL older than 5.6.6. # TRANSLATIONS: language translations were updated by these fine people: (in reverse alphabetical order of language codes): * ru: Kirill Isakov [Russian] * eo: Keith Bowes [Esperanto] Signed-off-by: Adolf Belka --- lfs/fetchmail | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/lfs/fetchmail b/lfs/fetchmail index 6b2dda18a..dbba637ba 100644 --- a/lfs/fetchmail +++ b/lfs/fetchmail @@ -1,7 +1,7 @@ ############################################################################### # # # IPFire.org - A linux based firewall # -# Copyright (C) 2007-2023 IPFire Team # +# Copyright (C) 2007-2024 IPFire Team # # # # This program is free software: you can redistribute it and/or modify # # it under the terms of the GNU General Public License as published by # @@ -26,7 +26,7 @@ include Config SUMMARY = Full-Featured POP and IMAP Mail Retrieval Daemon -VER = 6.4.36 +VER = 6.4.38 THISAPP = fetchmail-$(VER) DL_FILE = $(THISAPP).tar.xz @@ -34,7 +34,7 @@ DL_FROM = $(URL_IPFIRE) DIR_APP = $(DIR_SRC)/$(THISAPP) TARGET = $(DIR_INFO)/$(THISAPP) PROG = fetchmail -PAK_VER = 15 +PAK_VER = 16 DEPS = @@ -48,7 +48,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = eb2f68d8e9254bd1cabb20aa8058326ee1c1e6819fc2ce011943708018b455d4259a2cf21d6eec0a4898ee1768c14f32d3617302ad418ccfbf6746c75c92c1fa +$(DL_FILE)_BLAKE2 = 6bb743b0e1f47143f69e3790ba2ad8849d2ec216c5fd7cc427a737e00183f2e3a65007df9dc5ffdebd991bd13e079a501519b271d02b1fd75151032d74e84dd2 install : $(TARGET)