Displaying 20 results from an estimated 100000 matches similar to: "CVS state"
2018 Jul 11
4
LMTP crashing heavily for my 2.2.36 installation
On Wed, Jul 11, 2018 at 10:46 AM, Timo Sirainen <tss at iki.fi> wrote:
> On 11 Jul 2018, at 8.41, Wolfgang Rosenauer <wrosenauer at gmail.com> wrote:
> >
> > I'm running 2.2.36 (as provided by openSUSE in their server:mail
> repository) and at least at one of my systems LMTP is crashing regularly on
> certain messages (apparently a lot of them).
> >
>
2007 Apr 06
5
1.0.rc30 released
http://dovecot.org/releases/dovecot-1.0.rc30.tar.gz
http://dovecot.org/releases/dovecot-1.0.rc30.tar.gz.sig
So, this is it. Unless you can find a new and important bug within a
week, this release is the same as v1.0. I'll only update the version
number and NEWS file.
Changes since rc29:
* PAM: Lowercase the PAM service name when calling with "args = *".
Linux PAM did this
2007 Apr 06
5
1.0.rc30 released
http://dovecot.org/releases/dovecot-1.0.rc30.tar.gz
http://dovecot.org/releases/dovecot-1.0.rc30.tar.gz.sig
So, this is it. Unless you can find a new and important bug within a
week, this release is the same as v1.0. I'll only update the version
number and NEWS file.
Changes since rc29:
* PAM: Lowercase the PAM service name when calling with "args = *".
Linux PAM did this
2008 Mar 11
2
dovecot-1.1.rc3 segmentation fault in fetch_bodystructure
Hi,
another imap crash with latest dovecot.
segmentation fault in fetch_bodystructure
src/imap/imap-fetch.c
static int fetch_bodystructure(struct imap_fetch_context *ctx,
struct mail *mail, void *context ATTR_UNUSED)
{
const char *bodystructure;
if (mail_get_special(mail, MAIL_FETCH_IMAP_BODYSTRUCTURE,
2003 Jan 11
2
0.99.6rc3
Well, "release candidate" wasn't really right name for last two
versions. Maybe not for this one either, it has a few changes that could
potentially break things badly (new hash table code especially). Anyway,
seems to work with me. If I don't see any problems with it for a few
days it'll be the final.
The really great news is that we support threading. A lot of people have
2003 Jan 14
0
0.99.6 released
Several bugfixes since 0.99.6rc3. Here's again the change summary since
0.99.5:
v0.99.6 2003-01-13 Timo Sirainen <tss at iki.fi>
+ THREAD=REFERENCES extension support. ORDEREDSUBJECT would be easy to
add, but I think it's pretty useless.
+ SORT is much faster now.
+ mbox: If ~/mail directory isn't found, create it.
+ Log login usernames
* Some coding style changes
2009 May 04
2
Problem with BODYSTRUCTURE (wrong charset)
Hi,
I've changed a program that fetches mail via IMAP from an Exchange Server to use our Dovecot machine.
But now I'm experiencing strange problems with seem to be caused by a wrong BODYSTRUCTURE answer that causes wrong charset handling. When fetchting the BODYSTRUCTURE I see this:
Dovecot:
88 UID fetch 32 (BODYSTRUCTURE)
* 1 FETCH (UID 32 BODYSTRUCTURE ("text"
2003 Jun 26
3
0.99.10 released
No bug reports since rc4, so here it is.
v0.99.10 2003-06-26 Timo Sirainen <tss at iki.fi>
* Default PAM service name changed to "dovecot". This means that
if you're using PAM, you most likely have to do
mv /etc/pam.d/imap /etc/pam.d/dovecot
If you wish to keep using imap, see doc/auth.txt.
* ~/rawlog directory changed to ~/dovecot.rawlog
+ Faster and better
2005 Sep 11
1
1.0alpha2 released
Changes:
- Some cache file corruption fixes (shouldn't be any left?)
- Some index file fixes with mmap_disable=yes
- Some mbox syncing fixes
- Timezones in mbox From-lines were handled wrong
- Added pop3_reuse_xuidl setting. Patch by Chris Wakelin
- "stack frame changed" crashfix for FETCH BODYSTRUCTURE
- Added %R (reverse string) and %H (hash string) variable modifiers.
2017 May 30
7
v2.2.30 released
https://dovecot.org/releases/2.2/dovecot-2.2.30.tar.gz
https://dovecot.org/releases/2.2/dovecot-2.2.30.tar.gz.sig
* auth: Use timing safe comparisons for everything related to
passwords. It's unlikely that these could have been used for
practical attacks, especially because Dovecot delays and flushes all
failed authentications in 2 second intervals. Also it could have
worked only
2017 May 30
7
v2.2.30 released
https://dovecot.org/releases/2.2/dovecot-2.2.30.tar.gz
https://dovecot.org/releases/2.2/dovecot-2.2.30.tar.gz.sig
* auth: Use timing safe comparisons for everything related to
passwords. It's unlikely that these could have been used for
practical attacks, especially because Dovecot delays and flushes all
failed authentications in 2 second intervals. Also it could have
worked only
2018 Jul 12
0
LMTP crashing heavily for my 2.2.36 installation
On Wed, Jul 11, 2018 at 6:03 PM, Aki Tuomi <aki.tuomi at dovecot.fi> wrote:
> One alternative is to migrate into sdbox format, in which this is supported
>
>
>
> ---
> Aki Tuomi
> Dovecot oy
>
> -------- Original message --------
> From: Wolfgang Rosenauer <wrosenauer at gmail.com>
> Date: 11/07/2018 18:14 (GMT+02:00)
> To: Timo Sirainen <tss at
2003 Nov 10
1
0.99.10.1 released
Since release candidate I added fix for CRLF + partial BODY[] fetching.
I hope everything works :) I've been running it with mbox for a while
and it seems to work fine.
v0.99.10.1 2003-11-10 Timo Sirainen <tss at iki.fi>
* mbox: \Draft and \Deleted flags used opposite flag chars in
X-Status header. We were incompatible with other mbox accessing
software.
WARNING: Upgrading
2006 Jun 13
5
1.0.beta9 released
Fixes a lot of bugs. The next release will be the first "release
candidate" instead of a beta.
* PAM: Don't call pam_setcred() unless setcred=yes PAM passdb
argument was given.
* Moved around settings in dovecot-example.conf to be in more logical
groups.
+ Local delivery agent (deliver binary) works again.
+ LDAP: Added support for SASL binding. Patch by Geert Jansen
+
2006 Jun 13
5
1.0.beta9 released
Fixes a lot of bugs. The next release will be the first "release
candidate" instead of a beta.
* PAM: Don't call pam_setcred() unless setcred=yes PAM passdb
argument was given.
* Moved around settings in dovecot-example.conf to be in more logical
groups.
+ Local delivery agent (deliver binary) works again.
+ LDAP: Added support for SASL binding. Patch by Geert Jansen
+
2015 Dec 15
2
Assert failure in 2.2.20: imap-fetch.c:554 (ctx->client->output_cmd_lock || ctx->client->output_cmd_lock == cmd)
Just got another core-dump from Dovecot's imap process on our mail server.
Dovecot 2.2.20
Solaris 10 / x86
Maildir
Output from syslog:
Dec 14 10:58:12 mail dovecot: [ID 583609 mail.crit] imap(oling): Panic: file imap-fetch.c: line 554: assertion failed: (ctx->client->output_cmd_lock == NULL || ctx->client->output_cmd_lock == cmd)
Dec 14 10:58:15 mail dovecot: [ID 583609
2017 Jun 01
0
v2.2.30 released
On 30 May 2017 at 21:16, Timo Sirainen <tss at iki.fi> wrote:
> https://dovecot.org/releases/2.2/dovecot-2.2.30.tar.gz
> https://dovecot.org/releases/2.2/dovecot-2.2.30.tar.gz.sig
>
> * auth: Use timing safe comparisons for everything related to
> passwords. It's unlikely that these could have been used for
> practical attacks, especially because Dovecot delays
2008 Mar 10
2
Consecutive crashes of serveral imapd processes
This is 1.0.13, the processes crashed a few seconds apart from each
other:
GNU gdb 6.7.1-debian
Copyright (C) 2007 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show copying"
and "show
2009 Nov 20
5
v1.2.8 released
http://dovecot.org/releases/1.2/dovecot-1.2.8.tar.gz
http://dovecot.org/releases/1.2/dovecot-1.2.8.tar.gz.sig
This is mainly to fix the 0777 base_dir creation issue, which could be
considered a security hole, exploitable by local users. An attacker
could for example replace Dovecot's auth socket and log in as other
users. Gaining root privileges isn't possible though.
This affects only
2009 Nov 20
5
v1.2.8 released
http://dovecot.org/releases/1.2/dovecot-1.2.8.tar.gz
http://dovecot.org/releases/1.2/dovecot-1.2.8.tar.gz.sig
This is mainly to fix the 0777 base_dir creation issue, which could be
considered a security hole, exploitable by local users. An attacker
could for example replace Dovecot's auth socket and log in as other
users. Gaining root privileges isn't possible though.
This affects only