similar to: CVS state

Displaying 20 results from an estimated 100000 matches similar to: "CVS state"

2018 Jul 11
4
LMTP crashing heavily for my 2.2.36 installation
On Wed, Jul 11, 2018 at 10:46 AM, Timo Sirainen <tss at iki.fi> wrote: > On 11 Jul 2018, at 8.41, Wolfgang Rosenauer <wrosenauer at gmail.com> wrote: > > > > I'm running 2.2.36 (as provided by openSUSE in their server:mail > repository) and at least at one of my systems LMTP is crashing regularly on > certain messages (apparently a lot of them). > > >
2007 Apr 06
5
1.0.rc30 released
http://dovecot.org/releases/dovecot-1.0.rc30.tar.gz http://dovecot.org/releases/dovecot-1.0.rc30.tar.gz.sig So, this is it. Unless you can find a new and important bug within a week, this release is the same as v1.0. I'll only update the version number and NEWS file. Changes since rc29: * PAM: Lowercase the PAM service name when calling with "args = *". Linux PAM did this
2007 Apr 06
5
1.0.rc30 released
http://dovecot.org/releases/dovecot-1.0.rc30.tar.gz http://dovecot.org/releases/dovecot-1.0.rc30.tar.gz.sig So, this is it. Unless you can find a new and important bug within a week, this release is the same as v1.0. I'll only update the version number and NEWS file. Changes since rc29: * PAM: Lowercase the PAM service name when calling with "args = *". Linux PAM did this
2008 Mar 11
2
dovecot-1.1.rc3 segmentation fault in fetch_bodystructure
Hi, another imap crash with latest dovecot. segmentation fault in fetch_bodystructure src/imap/imap-fetch.c static int fetch_bodystructure(struct imap_fetch_context *ctx, struct mail *mail, void *context ATTR_UNUSED) { const char *bodystructure; if (mail_get_special(mail, MAIL_FETCH_IMAP_BODYSTRUCTURE,
2003 Jan 11
2
0.99.6rc3
Well, "release candidate" wasn't really right name for last two versions. Maybe not for this one either, it has a few changes that could potentially break things badly (new hash table code especially). Anyway, seems to work with me. If I don't see any problems with it for a few days it'll be the final. The really great news is that we support threading. A lot of people have
2003 Jan 14
0
0.99.6 released
Several bugfixes since 0.99.6rc3. Here's again the change summary since 0.99.5: v0.99.6 2003-01-13 Timo Sirainen <tss at iki.fi> + THREAD=REFERENCES extension support. ORDEREDSUBJECT would be easy to add, but I think it's pretty useless. + SORT is much faster now. + mbox: If ~/mail directory isn't found, create it. + Log login usernames * Some coding style changes
2009 May 04
2
Problem with BODYSTRUCTURE (wrong charset)
Hi, I've changed a program that fetches mail via IMAP from an Exchange Server to use our Dovecot machine. But now I'm experiencing strange problems with seem to be caused by a wrong BODYSTRUCTURE answer that causes wrong charset handling. When fetchting the BODYSTRUCTURE I see this: Dovecot: 88 UID fetch 32 (BODYSTRUCTURE) * 1 FETCH (UID 32 BODYSTRUCTURE ("text"
2003 Jun 26
3
0.99.10 released
No bug reports since rc4, so here it is. v0.99.10 2003-06-26 Timo Sirainen <tss at iki.fi> * Default PAM service name changed to "dovecot". This means that if you're using PAM, you most likely have to do mv /etc/pam.d/imap /etc/pam.d/dovecot If you wish to keep using imap, see doc/auth.txt. * ~/rawlog directory changed to ~/dovecot.rawlog + Faster and better
2005 Sep 11
1
1.0alpha2 released
Changes: - Some cache file corruption fixes (shouldn't be any left?) - Some index file fixes with mmap_disable=yes - Some mbox syncing fixes - Timezones in mbox From-lines were handled wrong - Added pop3_reuse_xuidl setting. Patch by Chris Wakelin - "stack frame changed" crashfix for FETCH BODYSTRUCTURE - Added %R (reverse string) and %H (hash string) variable modifiers.
2017 May 30
7
v2.2.30 released
https://dovecot.org/releases/2.2/dovecot-2.2.30.tar.gz https://dovecot.org/releases/2.2/dovecot-2.2.30.tar.gz.sig * auth: Use timing safe comparisons for everything related to passwords. It's unlikely that these could have been used for practical attacks, especially because Dovecot delays and flushes all failed authentications in 2 second intervals. Also it could have worked only
2017 May 30
7
v2.2.30 released
https://dovecot.org/releases/2.2/dovecot-2.2.30.tar.gz https://dovecot.org/releases/2.2/dovecot-2.2.30.tar.gz.sig * auth: Use timing safe comparisons for everything related to passwords. It's unlikely that these could have been used for practical attacks, especially because Dovecot delays and flushes all failed authentications in 2 second intervals. Also it could have worked only
2018 Jul 12
0
LMTP crashing heavily for my 2.2.36 installation
On Wed, Jul 11, 2018 at 6:03 PM, Aki Tuomi <aki.tuomi at dovecot.fi> wrote: > One alternative is to migrate into sdbox format, in which this is supported > > > > --- > Aki Tuomi > Dovecot oy > > -------- Original message -------- > From: Wolfgang Rosenauer <wrosenauer at gmail.com> > Date: 11/07/2018 18:14 (GMT+02:00) > To: Timo Sirainen <tss at
2003 Nov 10
1
0.99.10.1 released
Since release candidate I added fix for CRLF + partial BODY[] fetching. I hope everything works :) I've been running it with mbox for a while and it seems to work fine. v0.99.10.1 2003-11-10 Timo Sirainen <tss at iki.fi> * mbox: \Draft and \Deleted flags used opposite flag chars in X-Status header. We were incompatible with other mbox accessing software. WARNING: Upgrading
2006 Jun 13
5
1.0.beta9 released
Fixes a lot of bugs. The next release will be the first "release candidate" instead of a beta. * PAM: Don't call pam_setcred() unless setcred=yes PAM passdb argument was given. * Moved around settings in dovecot-example.conf to be in more logical groups. + Local delivery agent (deliver binary) works again. + LDAP: Added support for SASL binding. Patch by Geert Jansen +
2006 Jun 13
5
1.0.beta9 released
Fixes a lot of bugs. The next release will be the first "release candidate" instead of a beta. * PAM: Don't call pam_setcred() unless setcred=yes PAM passdb argument was given. * Moved around settings in dovecot-example.conf to be in more logical groups. + Local delivery agent (deliver binary) works again. + LDAP: Added support for SASL binding. Patch by Geert Jansen +
2015 Dec 15
2
Assert failure in 2.2.20: imap-fetch.c:554 (ctx->client->output_cmd_lock || ctx->client->output_cmd_lock == cmd)
Just got another core-dump from Dovecot's imap process on our mail server. Dovecot 2.2.20 Solaris 10 / x86 Maildir Output from syslog: Dec 14 10:58:12 mail dovecot: [ID 583609 mail.crit] imap(oling): Panic: file imap-fetch.c: line 554: assertion failed: (ctx->client->output_cmd_lock == NULL || ctx->client->output_cmd_lock == cmd) Dec 14 10:58:15 mail dovecot: [ID 583609
2017 Jun 01
0
v2.2.30 released
On 30 May 2017 at 21:16, Timo Sirainen <tss at iki.fi> wrote: > https://dovecot.org/releases/2.2/dovecot-2.2.30.tar.gz > https://dovecot.org/releases/2.2/dovecot-2.2.30.tar.gz.sig > > * auth: Use timing safe comparisons for everything related to > passwords. It's unlikely that these could have been used for > practical attacks, especially because Dovecot delays
2008 Mar 10
2
Consecutive crashes of serveral imapd processes
This is 1.0.13, the processes crashed a few seconds apart from each other: GNU gdb 6.7.1-debian Copyright (C) 2007 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show
2009 Nov 20
5
v1.2.8 released
http://dovecot.org/releases/1.2/dovecot-1.2.8.tar.gz http://dovecot.org/releases/1.2/dovecot-1.2.8.tar.gz.sig This is mainly to fix the 0777 base_dir creation issue, which could be considered a security hole, exploitable by local users. An attacker could for example replace Dovecot's auth socket and log in as other users. Gaining root privileges isn't possible though. This affects only
2009 Nov 20
5
v1.2.8 released
http://dovecot.org/releases/1.2/dovecot-1.2.8.tar.gz http://dovecot.org/releases/1.2/dovecot-1.2.8.tar.gz.sig This is mainly to fix the 0777 base_dir creation issue, which could be considered a security hole, exploitable by local users. An attacker could for example replace Dovecot's auth socket and log in as other users. Gaining root privileges isn't possible though. This affects only