summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFabian Groffen <grobian@gentoo.org>2020-11-27 09:00:26 +0100
committerFabian Groffen <grobian@gentoo.org>2020-11-27 09:00:26 +0100
commit485d5cdad8ecfbfafb6dbfa54a9e059211a2e747 (patch)
tree974df49abb94f6b27db362afaa0f8e88e218519e /mail-client/mutt/files
parentnet-analyzer/monitoring-plugins: sparc stable wrt bug #757105 (diff)
downloadgentoo-485d5cdad8ecfbfafb6dbfa54a9e059211a2e747.tar.gz
gentoo-485d5cdad8ecfbfafb6dbfa54a9e059211a2e747.tar.bz2
gentoo-485d5cdad8ecfbfafb6dbfa54a9e059211a2e747.zip
mail-client/mutt: cleanup old
Bug: https://bugs.gentoo.org/755866 Package-Manager: Portage-3.0.9, Repoman-3.0.2 Signed-off-by: Fabian Groffen <grobian@gentoo.org>
Diffstat (limited to 'mail-client/mutt/files')
-rw-r--r--mail-client/mutt/files/mutt-1.14.4-no-imap-preauth-with-tunnel.patch30
1 files changed, 0 insertions, 30 deletions
diff --git a/mail-client/mutt/files/mutt-1.14.4-no-imap-preauth-with-tunnel.patch b/mail-client/mutt/files/mutt-1.14.4-no-imap-preauth-with-tunnel.patch
deleted file mode 100644
index d4d2104db08c..000000000000
--- a/mail-client/mutt/files/mutt-1.14.4-no-imap-preauth-with-tunnel.patch
+++ /dev/null
@@ -1,30 +0,0 @@
-From dc909119b3433a84290f0095c0f43a23b98b3748 Mon Sep 17 00:00:00 2001
-From: Kevin McCarthy <kevin@8t8.us>
-Date: Sat, 20 Jun 2020 06:35:35 -0700
-Subject: [PATCH] Don't check IMAP PREAUTH encryption if $tunnel is in use.
-
-$tunnel is used to create an external encrypted connection. The
-default of $ssl_starttls is yes, meaning those kinds of connections
-will be broken by the CVE-2020-14093 fix.
----
- imap/imap.c | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/imap/imap.c b/imap/imap.c
-index 3ca10df4..78d75b07 100644
---- a/imap/imap.c
-+++ b/imap/imap.c
-@@ -532,8 +532,8 @@ int imap_open_connection (IMAP_DATA* idata)
- {
- #if defined(USE_SSL)
- /* An unencrypted PREAUTH response is most likely a MITM attack.
-- * Require a confirmation. */
-- if (!idata->conn->ssf)
-+ * Require a confirmation unless using $tunnel. */
-+ if (!idata->conn->ssf && !Tunnel)
- {
- if (option(OPTSSLFORCETLS) ||
- (query_quadoption (OPT_SSLSTARTTLS,
---
-GitLab
-