Bug 262362 - mail/fetchmail: update to 6.4.28
Summary: mail/fetchmail: update to 6.4.28
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: --- Affects Only Me
Assignee: Matthias Andree
URL:
Keywords: patch
Depends on:
Blocks:
 
Reported: 2022-03-05 16:38 UTC by Matthias Andree
Modified: 2022-03-06 23:16 UTC (History)
1 user (show)

See Also:
chalpin: maintainer-feedback+
mandree: merge-quarterly+


Attachments
mail/fetchmail: update to 6.4.28 (1.92 KB, patch)
2022-03-05 16:38 UTC, Matthias Andree
chalpin: maintainer-approval+
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Matthias Andree freebsd_committer freebsd_triage 2022-03-05 16:38:44 UTC
Created attachment 232267 [details]
mail/fetchmail: update to 6.4.28

BREAKING CHANGES:
* Bump wolfSSL minimum required version to 5.1.1 to pull in security fix.

FIXES:
* When using wolfSSL 5.0.0, work around a bug that appears to hit wolfSSL when
  receiving handshake records while still in SSL_peek(). Workaround is to read
  1 byte and cache it, then call SSL_peek() again.
  This affects only some TLS 1.3 servers. 
  https://github.com/wolfSSL/wolfssl/issues/4593

TRANSLATIONS: language translations were updated by this fine people:
* es:    Cristian Othón Martínez Vera [Spanish]
* ro:    Remus-Gabriel Chelu [Romanian]
* sr:    Мирослав Николић (Miroslav Nikolić) [Serbian]
Comment 1 Corey Halpin 2022-03-06 16:09:21 UTC
Looks good to me. Built package works in my testing. Also passes `poudriere testport` on both and64 and i386 under 13.0 and 12.2 for the following configurations:
  - Default settings 
  - ssl=base, GSSAPI_MIT
  - ssl=base, GSSAPI_NONE
  - ssl=openssl
  - ssl=openssl with SSL2 and SSL3 disabled
  - ssl=openssl, GSSAPI_NONE
  - WolfSSL

mail/fetchmailconf passes 'poudriere testport' on both amd64 and i386 under 13.0 and 12.2 with default settings.

I approve this patch, thank you!
Comment 2 commit-hook freebsd_committer freebsd_triage 2022-03-06 23:15:57 UTC
A commit in branch 2022Q1 references this bug:

URL: https://cgit.FreeBSD.org/ports/commit/?id=7ceeed1b34c1341a087d4218f829ae558f76c11c

commit 7ceeed1b34c1341a087d4218f829ae558f76c11c
Author:     Matthias Andree <mandree@FreeBSD.org>
AuthorDate: 2022-03-05 16:34:48 +0000
Commit:     Matthias Andree <mandree@FreeBSD.org>
CommitDate: 2022-03-06 15:08:17 +0000

    mail/fetchmail: update to 6.4.28

    BREAKING CHANGES:
    * Bump wolfSSL minimum required version to 5.1.1 to pull in security fix.

    FIXES:
    * When using wolfSSL 5.0.0, work around a bug that appears to hit wolfSSL when
      receiving handshake records while still in SSL_peek(). Workaround is to read
      1 byte and cache it, then call SSL_peek() again.
      This affects only some servers. https://github.com/wolfSSL/wolfssl/issues/4593

    TRANSLATIONS: language translations were updated by this fine people:
    * es:    Cristian Othón Martínez Vera [Spanish]
    * ro:    Remus-Gabriel Chelu [Romanian]
    * sr:    Мирослав Николић (Miroslav Nikolić) [Serbian]

    MFH:            2022Q1
    PR:             262362
    Approved by:    Corey Halpin (maintainer)

    (cherry picked from commit e1839db543a7d79daf9e6728a783714cdcbccafe)

 mail/fetchmail/Makefile | 2 +-
 mail/fetchmail/distinfo | 6 +++---
 2 files changed, 4 insertions(+), 4 deletions(-)
Comment 3 Matthias Andree freebsd_committer freebsd_triage 2022-03-06 23:16:36 UTC
Sorry for the incomplete (missing PR & Approval) commit on main, quarterly has all the details.