FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

I am looking for an LTO tape library. Do you have one to spare?
Port details
fetchmail 6.3.26 mail on this many watch lists=213 search for ports that depend on this port An older version of this port was marked as vulnerable.
Batch mail retrieval utility for IMAP/POP3/ETRN/ODMR
Maintained by: chalpin@cs.wisc.edu search for ports maintained by this maintainer
Port Added: unknown
Also Listed In: ipv6
License: not specified in port


Fetchmail is a full-featured IMAP/POP2/POP3/APOP/KPOP/ETRN/ODMR client with
easy configuration, daemon mode, forwarding via SMTP or local MDA, and
superior reply handling.  It is used to handle intermittent email connections
by acting as a coupling that seamlessly batch forwards fetched mail from your
mail server to your local delivery system, allowing you to read it with your
favourite mail user agent.  Fetchmail also includes useful spam filtering and
multi-user functions.

A typical use of fetchmail is to connect to your ISP's POP3 server,
downloading your mail into the INBOX on your local computer.  You may then
read the mail, offline if you want, using pine, mutt, or any standard mail
user agent.

WWW: http://fetchmail.berlios.de/
SVNWeb : Main Web Site : Distfiles Availability : PortsMon

NOTE: FreshPorts displays only required dependencies information. Optional dependencies are not covered.

Required To Build:
  1. security/openssl
  2. devel/gmake
Required To Run:
  1. security/ca_root_nss
  2. security/openssl
Required Libraries:
  1. devel/gettext
There are no ports dependent upon this port

To install the port: cd /usr/ports/mail/fetchmail/ && make install clean
To add the package: pkg install mail/fetchmail


Configuration Options
===> The following configuration options are available for fetchmail-6.3.26:
     GSSAPI=on: Build GSSAPI/Kerberos 5 support
     NLS=on: Native Language Support
     NTLM=off: Build in support for NTLM/MSN authentication
     X11=off: Python/Tkinter dependencies for ``fetchmailconf''
===> Use 'make config' to modify these settings

Master Sites:
  1. ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/
  2. http://downloads.sourceforge.net/project/fetchmail/branch_6.3/
  3. http://mandree.home.pages.de/fetchmail/

Number of commits found: 155 (showing only 100 on this page)

1 | 2  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
21 Jan 2014 23:40:23
Original commit files touched by this commit  6.3.26
Revision:340674
bapt search for other commits by this committer
Fix properties on pkg-plist
20 Sep 2013 19:59:14
Original commit files touched by this commit  6.3.26
Revision:327742
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
mail)
14 Aug 2013 22:35:54
Refresh Original commit files touched by this commit
Revision:324744  Sanity Test Failure
ak search for other commits by this committer
- Remove MAKE_JOBS_SAFE variable

Approved by:	portmgr (bdrewery)
24 Apr 2013 18:10:32
Original commit files touched by this commit  6.3.26
Revision:316464
ak search for other commits by this committer
- Convert USE_GETTEXT to USES (part 3)

Approved by:	portmgr (bapt)
23 Apr 2013 22:38:00
Original commit files touched by this commit  6.3.26
Revision:316398
mandree search for other commits by this committer
Upgrade to new version 6.3.26.

This fixes one data loss bug that causes the last line of a message to
be lost if it is unterminated (i. e. no LF character) and if the
"mimedecode" option is enabled (which defaults to "off").

PR:		ports/178092
Approved by:	Corey Halpin (maintainer)
26 Mar 2013 08:56:29
Original commit files touched by this commit  6.3.25
Revision:315268
mandree search for other commits by this committer
Update to new upstream release 6.3.25.

Adds Esperanto-language translation.

PR:		ports/177094
Approved by:	Corey Halpin (maintainer)
03 Mar 2013 08:13:08
Original commit files touched by this commit  6.3.24_1
Revision:313331
beech search for other commits by this committer
- Update script for chasing _tkinter.so relocation

PR:		ports/176611
Submitted by:	Li-Wen Hsu <lwhsu@FreeBSD.org>
Approved by:	Corey Halpin <chalpin@cs.wisc.edu> (maintainer)
10 Jan 2013 01:46:38
Original commit files touched by this commit  6.3.24
Revision:310168
mandree search for other commits by this committer
Fix up my patch error.
Not bumping PORTREVISION because there is no functional change,
the script has either replaced itself through exec, or exited.
10 Jan 2013 01:36:21
Original commit files touched by this commit  6.3.24
Revision:310167
mandree search for other commits by this committer
Changes by Po-Chien Lin:
- Update to 6.3.24
- Switch to OptionsNG
- Remove unused variables: PATCH_STRIP, MAKE_ENV
- Rearrange ordering of some sections
- Use PORTDOCS to handle document list instead of pkg-plist
- Alter pkg-plst to make portlint(1) happier
- Cleanup TABs
- Set USE_PYTHON_RUN only if X11 option is set.
- Rename files/fetchmailconf to files/fetchmailconf.in,
  add it into SUB_FILES, and make the corresponding change in
  pre-patch target.
- The `fetchmailconf' wrapper will only be installed when X11
  option is unset, otherwise we use the native wrapper which will
  directly call the script under PYTHON_SITELIBDIR.
- Add %%X11%% and %%NOX11%% prefix to PLIST_SUB.

Changes by Corey Halpin (maintainer):
- Update MASTER_SITES

PR:		174873
Submitted by:	Po-Chien Lin <linpc@cs.nctu.edu.tw>
Approved by:	Corey Halpin (maintainer)
30 Aug 2012 06:24:48
Original commit files touched by this commit  6.3.22
Revision:303362
mandree search for other commits by this committer
Update to upstream release fetchmail 6.3.22.

Fixes CVE-2011-3389 (reenabling a countermeasure against
chosen-plaintext attacks against block cipher initialization)

Fixes CVE-2012-3482 (vulnerabilities in NTLM authentication; already
fixed in FreeBSD's port 6.3.21_1)

Assorted other fixes and workarounds.

Adds a Swedish translation.

Release
Notes:	http://developer.berlios.de/project/shownotes.php?release_id=19117

PR:		171177
Approved by:	Corey Halpin (maintainer)
Security:	CVE-2012-3482
Security:	http://www.vuxml.org/freebsd/83f9e943-e664-11e1-a66d-080027ef73ec.html
Security:	CVE-2011-3389
Security:	http://www.vuxml.org/freebsd/18ce9a90-f269-11e1-be53-080027ef73ec.html
27 Aug 2012 22:06:20
Original commit files touched by this commit  6.3.21_1
 This port version is marked as vulnerable.
adamw search for other commits by this committer
Typo nit.
27 Aug 2012 17:44:23
Original commit files touched by this commit  6.3.21_1
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update fetchmail to 6.3.21_1, fixing CVE-2012-3482.
Adjust VuXML database entry from < 6.3.22 to < 6.3.21_1.

PR:		ports/170613
Approved by:	maintainer timeout (14 days)
Security:	http://www.vuxml.org/freebsd/83f9e943-e664-11e1-a66d-080027ef73ec.html
Security:	CVE-2012-3482
24 Feb 2012 23:56:18
Original commit files touched by this commit  6.3.21
 This port version is marked as vulnerable.
cy search for other commits by this committer
Update 6.3.20 --> 6.3.21

PR:             165459
Approved by:    Maintainer (Corey Halpin <chalpin@cs.wisc.edu>)
14 Jan 2012 08:57:23
Original commit files touched by this commit  6.3.20_2
 This port version is marked as vulnerable.
dougb search for other commits by this committer
In the rc.d scripts, change assignments to rcvar to use the
literal name_enable wherever possible, and ${name}_enable
when it's not, to prepare for the demise of set_rcvar().

In cases where I had to hand-edit unusual instances also
modify formatting slightly to be more uniform (and in
some cases, correct). This includes adding some $FreeBSD$
tags, and most importantly moving rcvar= to right after
name= so it's clear that one is derived from the other.
23 Sep 2011 22:26:39
Original commit files touched by this commit  6.3.20_2
 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Add LDFLAGS to CONFIGURE_ENV and MAKE_ENV (as it was done with LDFLAGS)
- Fix all ports that add {CPP,LD}FLAGS to *_ENV to modify flags instead

PR:             157936
Submitted by:   myself
Exp-runs by:    pav
Approved by:    pav
21 Aug 2011 14:03:18
Original commit files touched by this commit  6.3.20_2
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Fix critical fetchmail-embeds-NULs bug found by Antoine Levitt.
15 Aug 2011 20:43:57
Original commit files touched by this commit  6.3.20_1
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Forced commit to note that the creation of /var/run/fetchmail
got broken as undesired side effect of this fix when pkg-install
was removed.  Regression fixed with previous commit.

PR:           ports/157613
Submitted by: crees
15 Aug 2011 20:13:22
Original commit files touched by this commit  6.3.20_1
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Assorted minor fixes and touch-ups:

- Fix:     rcfile: export FETCHMAILUSER=$fetchmail_user [1]

- Fix:     when installing from source, make /var/run/fetchmail directory
           so that a global fetchmail installation won't break after port
           upgrades

- Change:  compile GSSAPI support by default (it's in base)

- Cleanup: rcfile: drop support for fetchmail.sh script name

- Cleanup: rcfile: don't mix backtick with apostrophe in comments, they don't
           match

Reported by:  thierry, Victor Balada Diaz <victor@bsdes.net> [1]
Suggested by: Victor Balada Diaz <victor@bsdes.net> [1]
PR:           ports/151783
Approved by:  maintainer timeout [1]
09 Jul 2011 10:07:49
Original commit files touched by this commit  6.3.20
 This port version is marked as vulnerable.
crees search for other commits by this committer
Use USERS and GROUPS

PR:             ports/157613
Submitted by:   crees (me)
Approved by:    rene (mentor, implicit), Corey Halpin (maintainer)
06 Jun 2011 14:54:42
Original commit files touched by this commit  6.3.20
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Security update to new upstream release 6.3.20.
Changes:    
http://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=18583
Security:    CVE-2011-1947
            
http://www.vuxml.org/freebsd/f7d838f2-9039-11e0-a051-080027ef73ec.html
Approved by: Corey Halpin (maintainer)
PR:          ports/157661
11 Dec 2010 22:27:06
Original commit files touched by this commit  6.3.19
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream release 6.3.19.

Approved by:  Corey Halpin (maintainer)
Submitted by: mandree
PR:           ports/152999
14 Nov 2010 15:44:43
Original commit files touched by this commit  6.3.18
 This port version is marked as vulnerable.
rene search for other commits by this committer
Fix build by skipping the validation of the XHTML 1.1 document
Mailbox-Names-UTF7.html

PR:             ports/152067
Submitted by:   Matthias Andree [matthias.andree gmx.de]
Approved by:    maintainer
25 Oct 2010 07:15:38
Original commit files touched by this commit  6.3.18
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream release 6.3.18.

Approved by: Corey Halpin (maintainer)
PR: ports/151686
20 Oct 2010 14:39:42
Original commit files touched by this commit  6.3.17_3
 This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Correct previous commit
- Bump PORTREVISION

Reported by:    Alexander Milanov <a@amilanov.com>
Approved by:    pgollucci (mentor, implicit)
19 Oct 2010 08:07:39
Original commit files touched by this commit  6.3.17_2
 This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Change PREFIX/etc/fetchmailrc.sample permission from 644 to 600
- Bump PORTREVISION

PR:             ports/151515
Submitted by:   Alexander Milanov <a@amilanov.com>
Approved by:    Corey Halpin <chalpin@cs.wisc.edu> (maintainer), pgollucci
(mentor, implicit)
31 May 2010 02:01:56
Original commit files touched by this commit  6.3.17_1
 This port version is marked as vulnerable.
ade search for other commits by this committer
Bounce PORTREVISION for gettext-related ports.  Have fun, ya'll.
23 May 2010 14:40:19
Original commit files touched by this commit  6.3.17
 This port version is marked as vulnerable.
sylvio search for other commits by this committer
- Fix when run fetchmail with apop access.

PR:             ports/146002
Submitted by:   mkgt00@gmail.com
Approved by:    maintainer (timeout > 14days)
22 May 2010 04:36:31
Original commit files touched by this commit  6.3.17
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 6.3.17

PR:             146589
Submitted by:   Corey Halpin <chalpin@cs.wisc.edu> (maintainer)
22 Apr 2010 19:13:24
Original commit files touched by this commit  6.3.16_1
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Security fix for CVE-2010-1167.

This unbreaks the build, since this vulnerability is listed
at http://www.vuxml.org/freebsd/09910d76-4c82-11df-83fb-0015587e2cc1.html.

Add the recommended upstream patch.

Bump PORTREVISION.

PR: ports/145857
Approved by: Corey Halpin (maintainer)
Approved by: garga (mentor)
07 Apr 2010 18:20:20
Original commit files touched by this commit  6.3.16
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream version.

Approved by: Corey Halpin (maintainer)
Approved by: garga@ (mentor)
02 Apr 2010 18:49:00
Original commit files touched by this commit  6.3.15
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 6.3.14

PR:             145298
Submitted by:   Corey Halpin <chalpin@cs.wisc.edu> (maintainer)
27 Mar 2010 00:15:24
Original commit files touched by this commit  6.3.15
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Begin the process of deprecating sysutils/rc_subr by
s#. %%RC_SUBR%%#. /etc/rc.subr#
12 Feb 2010 09:54:07
Original commit files touched by this commit  6.3.14
 This port version is marked as vulnerable.
mandree search for other commits by this committer
Update to new upstream release 6.3.14. Changes:

# SECURITY FIXES
* SSL/TLS certificate information is now also reported properly on computers
  that consider the "char" type signed. Fixes malloc() buffer overrun.
  Workaround for older versions: do not use verbose mode.  CVE-2010-0562
  See fetchmail-SA-2010-01.txt for details, including a minimal patch.

# BUG FIXES
* The IMAP client no longer skips messages from several IMAP servers including
  Dovecot if fetchmail's "idle" is in use.  Causes were that fetchmail (a)
  ignored some untagged responses when it should not (b) relied on EXISTS
  messages in response to EXPUNGE, which aren't mandated by RFC-3501 (the IMAP
  standard) and aren't sent by Dovecot either.
    Fix by Sunil Shetye (the fix also consolidates IMAP response handling,
(Only the first 15 lines of the commit message are shown above View all of this commit message)
04 Nov 2009 10:47:33
Original commit files touched by this commit  6.3.13
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 6.3.13 (updates translations and supports SMTP multiline replies)
- Remove Kerberos IV support, insecure and obsolete
- Mark BROKEN if KRB5_HOME is set and invalid
- Kill pre-configure, no longer needed
- Kill obsolete POP2 from make config menu, still available if given on make
  command line
- Auto-detect KRB5_HOME if it's $LOCALBASE or /usr
- MARK_JOBS_SAFE=yes
- Cease messing with @cwd in pkg-plist
- Reduce asterisks on pkg-message.in, to avoid screen clutter on long $PREFIX
  Rely on krb-config instead.

PR:             140100
Submitted by:   Matthias Andree <matthias.andree@gmx.de>
Approved by:    maintainer
08 Sep 2009 15:12:21
Original commit files touched by this commit  6.3.11_1
 This port version is marked as vulnerable.
wxs search for other commits by this committer
- Add a patch to fix segfault on startup.

PR:             ports/137972
Submitted by:   Christian Ludwig <chrissicool@chrissicool.net>
Approved by:    Corey Halpin <chalpin@cs.wisc.edu> (maintainer)
11 Aug 2009 15:27:11
Original commit files touched by this commit  6.3.11
 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Update to 6.3.11

PR:             137604
Submitted by:   Corey Halpin <chalpin@cs.wisc.edu> (maintainer)
http://www.freebsd.org/ports/portaudit/5179d85c-8683-11de-91b9-0022157515b2.html
15 Jul 2009 23:02:52
Original commit files touched by this commit  6.3.10
 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Update to 6.3.10
- Portlint

PR:             136774
Submitted by:   Corey Halpin <chalpin@cs.wisc.edu> (maintainer)
04 May 2009 23:09:15
Original commit files touched by this commit  6.3.9
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Pass maintainership to submitter

PR:             134189
Submitted by:   Corey Halpin <chalpin@cs.wisc.edu> (maintainer)
23 Mar 2009 01:01:15
Original commit files touched by this commit  6.3.9
 This port version is marked as vulnerable.
linimon search for other commits by this committer
Reset barner@FreeBSD.org due to several months of inactivity.

Hat:            portmgr
12 Jan 2009 00:59:27
Original commit files touched by this commit  6.3.9
 This port version is marked as vulnerable.
linimon search for other commits by this committer
Add http://homepages.uni-paderborn.de to MASTER_SITES.  The sunsite
mirrors appear to be behind.  Also (temporarily?) remove home.leo.org,
as the site seems to have been rearranged.

PR:             ports/130301
Submitted by:   Matthias Andree <matthias dot andree at gmx dot de>
Hat:            portmgr
08 Jan 2009 12:12:44
Original commit files touched by this commit  6.3.9
 This port version is marked as vulnerable.
pav search for other commits by this committer
- Update to 6.3.9

PR:             ports/129755
Submitted by:   Matthias Andree <matthias.andree@gmx.de>
Approved by:    maintainer timeout (barner; 20 days)
21 Aug 2008 06:18:49
Original commit files touched by this commit  6.3.8_7
 This port version is marked as vulnerable.
rafan search for other commits by this committer
Update CONFIGURE_ARGS for how we pass CONFIGURE_TARGET to configure script.
Specifically, newer autoconf (> 2.13) has different semantic of the
configure target. In short, one should use --build=CONFIGURE_TARGET
instead of CONFIGURE_TARGET directly. Otherwise, you will get a warning
and the old semantic may be removed in later autoconf releases.

To workaround this issue, many ports hack the CONFIGURE_TARGET variable
so that it contains the ``--build='' prefix.

To solve this issue, under the fact that some ports still have
configure script generated by the old autoconf, we use runtime detection
in the do-configure target so that the proper argument can be used.

Changes to Mk/*:
 - Add runtime detection magic in bsd.port.mk
(Only the first 15 lines of the commit message are shown above View all of this commit message)
01 Jul 2008 16:35:50
Original commit files touched by this commit  6.3.8_7
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Use revised patch for CVE-2008-2711
- Bump port revision

Security:       http://fetchmail.berlios.de/fetchmail-SA-2008-01.txt
Security:      
http://www.vuxml.org/freebsd/1e8e63c0-478a-11dd-a88d-000ea69a5213.html
20 Jun 2008 07:46:50
Original commit files touched by this commit  6.3.8_6
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Security fix: potential crash in -v -v verbose mode.
- Bump port revision

PR:             ports/124718
Submitted by:   Matthias Andree <matthias.andree@gmx.de>
Security:      
http://www.vuxml.org/freebsd/168190df-3e9a-11dd-87bc-000ea69a5213.html
Security:       CVE-2008-2711
06 Jun 2008 13:43:09
Original commit files touched by this commit  6.3.8_5
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Bump portrevision due to upgrade of devel/gettext.

The affected ports are the ones with gettext as a run-dependency
according to ports/INDEX-7 (5007 of them) and the ones with USE_GETTEXT
in Makefile (29 of them).

PR:             ports/124340
Submitted by:   edwin@
Approved by:    portmgr (pav)
06 Apr 2008 09:08:28
Original commit files touched by this commit  6.3.8_4
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Fix installation as non-root user

Submitted by:   Stefan Sperling
PR:             ports/122269
04 Oct 2007 01:49:29
Original commit files touched by this commit  6.3.8_4
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Remove always-false/true conditions based on OSVERSION 500000
03 Sep 2007 19:22:28
Original commit files touched by this commit  6.3.8_4
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Fix for CVE-2007-4565 [1]
- Manually include bsd.python.mk if WITH_X11 is set (after bsd.port.pre.mk) [2]

Security:      
http://www.vuxml.org/freebsd/45500f74-5947-11dc-87c1-000e2e5785ad.html
Security:       http://fetchmail.berlios.de/fetchmail-SA-2007-02.txt
Submitted by:   Matthias Andree <matthias.andree@gmx.de> [1]
PR:             ports/116011 [1]
Submitted by:   Jacula Modyun <jacula@gmail.com> [2]
PR:             ports/115714 [2]
13 Aug 2007 14:31:54
Original commit files touched by this commit  6.3.8_3
 This port version is marked as vulnerable.
barner search for other commits by this committer
- security/ca-roots is deprecated, switch to security/ca_roots_nss for
  SSL certificates.
23 Jul 2007 09:36:52
Original commit files touched by this commit  6.3.8_3
 This port version is marked as vulnerable.
rafan search for other commits by this committer
- Set --mandir and --infodir in CONFIGURE_ARGS if the configure script
  supports them.  This is determined by running ``configure --help'' in
  do-configure target and set the shell variable _LATE_CONFIGURE_ARGS
  which is then passed to CONFIGURE_ARGS.
- Remove --mandir and --infodir in ports' Makefile where applicable
  Few ports use REINPLACE_CMD to achieve the same effect, remove them too.
- Correct some manual pages location from PREFIX/man to MANPREFIX/man
- Define INFO_PATH where necessary
- Document that .info files are installed in a subdirectory relative to
  PREFIX/INFO_PATH and slightly change add-plist-info to use INFO_PATH and
  subdirectory detection.

PR:             ports/111470
Approved by:    portmgr
Discussed with: stas (Mk/*), gerald (info related stuffs)
Tested by:      pointyhat exp run
22 Jul 2007 11:20:19
Original commit files touched by this commit  6.3.8_3
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Actually respect the `fetchmail_user' variable in single daemon
  mode
- Document that above variable is ignored in the per-user daemon mode
- Bump port revision

Requested by:   Graham Menhennitt <graham@menhennitt.com.au>
PR:             ports/114701
06 Jul 2007 07:10:44
Original commit files touched by this commit  6.3.8_2
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Remove circular dependency in rcorder by removing the (unnessary) constraint
  that fetchmail is started "BEFORE LOGIN". "REQUIRE mail" (which in turn
  requires LOGIN) is enough.
- Bump PORTREVISION

PR:             ports/114294
Submitted by:   Alson van der Meulen <alson@flutnet.org>
06 Jun 2007 19:37:23
Original commit files touched by this commit  6.3.8_1
 This port version is marked as vulnerable.
barner search for other commits by this committer
Install fetchmailrc with 640 since it may contain passwords.
The fetchmailrc.sample file is still installed 644.
31 May 2007 20:09:30
Original commit files touched by this commit  6.3.8_1
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Add pkg-message pointing to documenation in rc script.
- Add pointers to fetchmail documentation to rc script.
31 May 2007 20:08:45
Original commit files touched by this commit  6.3.8_1
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Add pkg-message pointing to documenation in rc script.
- Add pointers to fetchmail documentation to rc script.
19 May 2007 20:32:57
Original commit files touched by this commit  6.3.8_1
 This port version is marked as vulnerable.
flz search for other commits by this committer
- Welcome X.org 7.2 \o/.
- Set X11BASE to ${LOCALBASE} for recent ${OSVERSION}.
- Bump PORTREVISION for ports intalling files in ${X11BASE}.
10 Apr 2007 19:37:00
Original commit files touched by this commit  6.3.8
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Make fetchable
- Remove home.pages.de master site
- Add sunsite mirror

PR:             ports/111443
Submitted by:   Matthias Andree
10 Apr 2007 14:10:12
Original commit files touched by this commit  6.3.8
 This port version is marked as vulnerable.
rafan search for other commits by this committer
- Fix fetch, MASTER_SITE_BERLIOS already contains %SUBDIR%
09 Apr 2007 20:04:05
Original commit files touched by this commit  6.3.8
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to 6.3.8
- Fix insecure APOP authentication (minor)

Security: http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt
Security: http://www.vuxml.org/freebsd/f1c4d133-e6d3-11db-99ea-0060084a00e5.html
ChangeLog:
https://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=12610
20 Feb 2007 08:13:17
Original commit files touched by this commit  6.3.7
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to 6.3.7
- Regression fixes for KPOP and repoll after server disconnect (TLS)
  Details:
https://lists.berlios.de/pipermail/fetchmail-announce/2007-February/000047.html
06 Jan 2007 14:38:43
Original commit files touched by this commit  6.3.6
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to 6.3.6
- Fixes two security issues, one of which is a longstanding password disclosure
bug.
- Several robustness fixes and other improvements

Release notes: 
https://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=11977
Security:      
http://www.vuxml.org/freebsd/5238ac45-9d8c-11db-858b-0060084a00e5.html
Security:      
http://www.vuxml.org/freebsd/37e30313-9d8c-11db-858b-0060084a00e5.html
Reported by:    Matthias Andree (upstream author)
02 Nov 2006 16:05:29
Original commit files touched by this commit  6.3.5
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to fetchmail 6.3.5. See here for the release notes:
 
http://developer.berlios.de/project/shownotes.php?group_id=1824&release_id=11358
- OPTIONize [1]
- GSSAPI support (requires Kerberos). [1]
- Removed POP2 from port's default configuration [1]

Requested by:   Stefan Thurner <thurners@nicsys.de> [1]
30 Aug 2006 11:56:13
Original commit files touched by this commit  6.3.4_3
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Add new rc.conf option "fetchmail_logging_facility" which can be used
  to specify where fetchmail logs to. Default: --syslog (as hardcoded
  before). [1]
- Use marco for cp [2]
- Try to remove directories not listed in mtree [2]
- No portrevision bump since the default behaviour remains the same, and
  a new fetchmail version is to be exspected soon anyway.

Requested by:   Gerard Seibert <gerard@seibercom.net> [1]
Submitted by:   Stanislav Sedov <ssedov@mbsd.msk.ru> [2]
PR:             ports/101517
26 May 2006 22:18:57
Original commit files touched by this commit  6.3.4_3
 This port version is marked as vulnerable.
barner search for other commits by this committer
Make prefix clean.

PR:                     ports/97977
Submitted by:           Esa Karkkainen <ejk@iki.fi>
Big shiny pointy hat:   me
25 May 2006 16:26:50
Original commit files touched by this commit  6.3.4_2
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Use %%RC_SUBR%% [1]
- Fix typo in Makefile [1]
- Fix recursive calls of rc script on older systems (requested in [2])
- Bump PORTREVISION

PR:                     97876 [1], 97335 [2]
Submitted by:           Jeremy Chadwick <freebsd@jdc.parodius.com> [1],
                        Veselin Slavov <vess@slavof.net> [2]
15 May 2006 21:18:40
Original commit files touched by this commit  6.3.4_1
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Fix PID file for system-wide daemon mode
- Fix package: Create /var/run/fetchmail in pkg-install instead of
  post-install target.
- Bump PORTREVISION

PR:             ports/97283
Submitted by:   Martin Jackson <mhjacks@swbell.net>
12 May 2006 16:58:48
Original commit files touched by this commit  6.3.4
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to 6.3.4 [1]
- Add rcNG script. See $PREFIX/etc/rc.d/fetchmail for
  instructions. Inspired by [2] and ports/www/apache22.

PR:             ports/96987 [1], ports/96079
Submitted by:   Rob MacGregor <freebsd.macgregor@blueyonder.co.uk> [1],
                Martin Jackson <mhjacks@swbell.net>
10 May 2006 22:37:39
Original commit files touched by this commit  6.3.4
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Remove USE_REINPLACE from ports starting with M
30 Jan 2006 12:47:53
Original commit files touched by this commit  6.3.2_1
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Prevent fetchmail from crashing if the .netrc file does not contain
  a password for a particular account.

- Bump PORTREVISION

Submitted by:   Craig Leres via Matthias Andree
23 Jan 2006 15:14:28
Original commit files touched by this commit  6.3.2
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to 6.3.2
- Changes:
  * Fixes a denial of service bug/fetchmail crash after sending a bounce
  * Adds a Maillennium (Comcast) workaround
  * ChangeLog:
https://lists.berlios.de/pipermail/fetchmail-announce/2006-January/000022.html
Security:       http://fetchmail.berlios.de/fetchmail-SA-2006-01.txt
Security:       CVE-2006-0321
Security:      
http://www.vuxml.org/freebsd/f11d3b22-88c6-11da-a7b2-0060084a00e5.html
19 Dec 2005 15:21:53
Original commit files touched by this commit  6.3.1
 This port version is marked as vulnerable.
barner search for other commits by this committer
Update to 6.3.1

 * Fix null pointer dereference w/ headerless message in
   multi-drop mode [1]
 * Removed patches are in the upstream distribution now
 * ChangeLog:
https://lists.berlios.de/pipermail/fetchmail-announce/2005-December/000017.html

Security: http://www.vuxml.org/freebsd/f7eb0b23-7099-11da-a15c-0060084a00e5.html
Security: http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt
Security: CVE-2005-4348
11 Dec 2005 21:24:18
Original commit files touched by this commit  6.3.0_3
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Fix a null pointer dereference in multi-drop mode [1]
- Fix packaging if python is not present at compile time [2]
- Sort targets in Makefile
- Fix variable in the WITH_X11 case
- Bump PORTREVISION (for [1])

Submitted by:   Andreas Haakh <bugReporter@Haakh.de> [1]
Reviewed by:    Matthias Andree <matthias.andree@gmx.de>
                (upstream maintainer) [1]
Reported by:    pointyhat via kris [2]
10 Dec 2005 19:58:31
Original commit files touched by this commit  6.3.0_2
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Add RUN_DEPENDS on security/ca-roots, so the certificate check really
  succeeds (if the servers certificate is signed by one of those authorites)

- Bump PORTREVISON, since a failing certiciate check spams the port users'
  maillog.
10 Dec 2005 16:09:13
Original commit files touched by this commit  6.3.0_1
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Use USE_OPENSSL [1]
- Remove obsolete --enable-inet6 configure argument [1]
- Don't try to enable Kerberos IV and V at the same time [1]
- Add WITH_NTLM knob. Inform port user about other knobs
  (WITH_X11, WITHOUT_NLS) [1]
- Correct man page patch [1]
- Fix default OpenSSL certificate path [1] [2]
- Fix plist [1] [3]
- Bump PORTREVISON

Submitted by:   Matthias Andree <matthias.andree@gmx.de> [1]
Reported by:    Dieter Rauschenberger <dr@d-ra.de> [2]
PR:             ports/90084 [2]
Reported by:    kris via pointyhat [3]
06 Dec 2005 21:08:15
Original commit files touched by this commit  6.2.5.2_4
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to fetchmail 6.3.0
- From the announcement:

  fetchmail 6.3.0 has been released on 2005-11-30. More than two years
  after the previous formal 6.2.5 release, this collects several dozen
  bug fixes, documentation, portability and IPv6 improvements and marks
  the beginning of a new "stable" 6.3.X branch that will not change,
  except for bug fixes and documentation updates.

- files/patch-pop2.c contributed by Stanislav Brabec <sbrabec@suse.cz>
  via Matthias Andree <matthias.andree@gmx.de> (upstream maintainer)
06 Dec 2005 21:07:19
Original commit files touched by this commit  6.3.0
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to fetchmail 6.3.0
- From the announcement:

  fetchmail 6.3.0 has been released on 2005-11-30. More than two years
  after the previous formal 6.2.5 release, this collects several dozen
  bug fixes, documentation, portability and IPv6 improvements and marks
  the beginning of a new "stable" 6.3.X branch that will not change,
  except for bug fixes and documentation updates.

- files/patch-pop2.c contributed by Stanislav Brabec <sbrabec@suse.cz>
  via Matthias Andree <matthias.andree@gmx.de> (upstream maintainer)
24 Nov 2005 14:08:01
Original commit files touched by this commit  6.2.5.2_4
 This port version is marked as vulnerable.
barner search for other commits by this committer
Add SHA256 for my ports (that don't already have it).
14 Nov 2005 11:48:53
Original commit files touched by this commit  6.2.5.2_4
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Fix a bug introduced with fetchmail-6.2.5.2_3, where it would sometimes
  leave some messages on an IMAP server, i.e. this is the correct fix
  for the following bug (as described Makefile:1.161 and
  files/patch-imap.c:1.1):

  fix IMAP client timeout bug with upstream servers that do not send updated
  EXISTS counts after acknowledging EXPUNGE see <http://bugs.debian.org/314509>

- Bump PORTREVISION to 4

PR:                     ports/88850
Submitted by:           Vasil Dimov
Patch provided by:      Matthias Andree (upstream maintainer)
Patch tested by:        barner, Vasil Dimov
10 Nov 2005 16:30:32
Original commit files touched by this commit  6.2.5.2_3
 This port version is marked as vulnerable.
barner search for other commits by this committer
Add private backup master site.

Requested by:   Diane Bruce <db@db.net>
PR:             ports/88787
10 Nov 2005 10:29:33
Original commit files touched by this commit  6.2.5.2_3
 This port version is marked as vulnerable.
barner search for other commits by this committer
- fix IMAP client timeout bug with upstream servers that do not send updated
  EXISTS counts after acknowledging EXPUNGE see <http://bugs.debian.org/314509>

- add fetchmailconf wrapper check for _tkinter.so (if python was installed but
  not Tkinter, the wrapper would still try to run fetchmailconf.bin, which
  gives a less clear error message to the user than was intended)

- let fetchmailconf wrapper pass command line arguments to fetchmailconf.bin
  (it supports -d and -f FILE)

- replace PREFIX with LOCALBASE where appropriate

- bump PORTREVISION

Submitted by:   Matthias Andree <matthias.andree@gmx.de>
PR:             ports/88444
30 Oct 2005 23:05:07
Original commit files touched by this commit  6.2.5.2_1
 This port version is marked as vulnerable.
barner search for other commits by this committer
Don't indent comment added in last commit by one tab, so it is not printed.
30 Oct 2005 19:06:46
Original commit files touched by this commit  6.2.5.2_1
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Use fetchmailconf-1.43.2 in order to fix a password exposure caused by
  insecure file creation.

- While here, move berlios.de to the top of the MASTERSITEs, since
  development takes place there.

- Bump PORTREVISION

Security:       CVE-2005-3088
Security:       http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt
28 Jul 2005 13:41:18
Original commit files touched by this commit  6.2.5.2
 This port version is marked as vulnerable.
barner search for other commits by this committer
Fix Kerberos {IV, V} detection.
23 Jul 2005 18:47:36
Original commit files touched by this commit  6.2.5.2
 This port version is marked as vulnerable.
barner search for other commits by this committer
Update WWW (new fetchmail homepage fetchmail.berlios.de).

PR:             ports/83900
Submitted by:   Matthias Andree <matthias.andree@gmx.de>
22 Jul 2005 07:07:14
Original commit files touched by this commit  6.2.5.2
 This port version is marked as vulnerable.
barner search for other commits by this committer
Forced commit to note the following (this also applies for the following files
removed in my earlier commit:

        files/patch-s1
        files/patch-r1
        files/patch-driver.c

Submitted by:   Matthias Andree <matthias DOT andree AT gmx DOT de>
Discovered by:  Miloslav Trmac
http://lists.berlios.de/pipermail/fetchmail-devel/2005-July/000397.html
New fix by:     Ludwig Nussel (SuSE security)
22 Jul 2005 06:59:44
Original commit files touched by this commit  6.2.5.2
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to 6.2.5.2. This fixes a denial of service vulerability introduced
  in version 6.2.5.1

- Use distribution patch from fetchmail.berlios.de instead of keeping the
  security fix in CVS (-> remove patch-r1, patch-s1 which contained to
  update from 6.2.5 to 6.2.5.1).

- The above patch also contains a patch that we kept locally in
  patch-driver.c: This one has been removed, too.
21 Jul 2005 10:25:33
Original commit files touched by this commit  6.2.5.1
 This port version is marked as vulnerable.
barner search for other commits by this committer
- Update to 6.2.5.1 (security update!)
- Add new master site
- Take maintainership (no objections on freebsd-ports,
  Matthias also favours this option as long as the new FreeBSD
  maintainer will be responsive and submit patches upstream - promissed :-)

Submitted by:   Matthias Andree <matthias DOT andree AT gmx DOT de>
PR:             ports/83805
Obtainted from: http://download.berlios.de/fetchmail/fetchmail-patch-6.2.5.1.gz
Security:      
http://www.vuxml.org/freebsd/3497d7be-2fef-45f4-8162-9063751b573a.html
18 Jul 2005 03:49:55
Original commit files touched by this commit  6.2.5_2
 This port version is marked as vulnerable.
linimon search for other commits by this committer
With portmgr hat on, reset eik's ports since he has been inactive for
several months (not responding to email).

Discussed among:        portmgr team
12 Apr 2005 03:26:57
Original commit files touched by this commit  6.2.5_2
 This port version is marked as vulnerable.
obrien search for other commits by this committer
At Kris's request, back out the MACHINE_ARCH spelling correction until
after 5.4-RELEASE.
11 Apr 2005 08:04:41
Original commit files touched by this commit  6.2.5_2
 This port version is marked as vulnerable.
obrien search for other commits by this committer
Assist getting more ports working on AMD64 by obeying the
Ports Collection documentation and use 'ARCH' rather than 'MACHINE_ARCH'.
28 Apr 2004 17:26:35
Original commit files touched by this commit  6.2.5_2
 This port version is marked as vulnerable.
eik search for other commits by this committer
- fix POP bug [1]
- add WITHOUT_NLS [2]

Seems like 6.2.6 takes a while...

PR:             60262 [1], 62732 [2]
Submitted by:   Stuart Barkley <stuartb@4gh.net> [1]
                Katsura Matsumoto <katsura@cc.osaka-kyoiku.ac.jp> [1]
18 Mar 2004 01:04:31
Original commit files touched by this commit  6.2.5_1
 This port version is marked as vulnerable.
eik search for other commits by this committer
SIZEify

Prompted by:    trevor
04 Feb 2004 04:36:30
Original commit files touched by this commit  6.2.5_1
 This port version is marked as vulnerable.
marcus search for other commits by this committer
Add USE_GETTEXT and bump PORTREVISION.

Submitted by:   trevor
Tested by:      bento
23 Jan 2004 18:12:26
Original commit files touched by this commit  6.2.5
 This port version is marked as vulnerable.
trevor search for other commits by this committer
Now gettext 0.12.1 is gettext-old.
16 Nov 2003 22:15:28
Original commit files touched by this commit  6.2.5
 This port version is marked as vulnerable.
eik search for other commits by this committer
Try some new fetchmail mirrors

Noticed by:     Bill Fenner's portsurvey
Approved by:    marcus (mentor)
14 Nov 2003 00:29:48
Original commit files touched by this commit  6.2.5
 This port version is marked as vulnerable.
eik search for other commits by this committer
switch my ports to my FreeBSD address

Approved by:    marcus (mentor)
24 Oct 2003 09:33:14
Original commit files touched by this commit  6.2.5
 This port version is marked as vulnerable.
sergei search for other commits by this committer
- Update to 6.2.5 (see http://catb.org/~esr/fetchmail/NEWS for details)
- Use DOCSDIR macro in pkg-plist
- Don't install yet another copy of GPL
- Pass maintainership to Oliver Eikemeier

PR:             58283, 58341
Submitted by:   Oliver Eikemeier <eikemeier@fillmore-labs.com>,
                Esa Karkkainen <ejk@iki.fi>
Approved by:    Ville Eerola <ve@sci.fi> (previous maintainer),
                krion (implicit)
09 Sep 2003 03:26:24
Original commit files touched by this commit  6.2.4_1
 This port version is marked as vulnerable.
silby search for other commits by this committer
Update fetchmail port to 6.2.4
26 Aug 2003 20:25:58
Original commit files touched by this commit  6.2.2_1
 This port version is marked as vulnerable.
marcus search for other commits by this committer
Bump the PORTREVISION for the ports directly affected by the gettext upgrade.

Prodded by:     kris
25 Aug 2003 05:41:38
Original commit files touched by this commit  6.2.2
 This port version is marked as vulnerable.
marcus search for other commits by this committer
Chase the libintl.so shared lib version.

Number of commits found: 155 (showing only 100 on this page)

1 | 2  »  

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
bugzilla40*Apr 18
bugzilla40*Apr 18
bugzilla42*Apr 18
bugzilla42*Apr 18
bugzilla44*Apr 18
bugzilla44*Apr 18
curlApr 11
dbus-glibApr 11
libaudiofileApr 11
linux-f10-curlApr 11
linux-f10-dbus-glibApr 11
linux-f10-libaudiofileApr 11
linux-f10-nas-libsApr 11
linux-f10-openldapApr 11
mingw32-openssl*Apr 11

13 vulnerabilities affecting 18 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds


Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24366
Broken 175
Deprecated 89
Ignore 529
Forbidden 6
Restricted 263
No CDROM 108
Vulnerable 29
Expired 8
Set to expire 76
Interactive 22
new 24 hours 1
new 48 hours4
new 7 days15
new fortnight39
new month143

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.