From: Matthias A. <mat...@gm...> - 2021-12-26 21:56:25
|
The 6.4.26 release of fetchmail is now available at the usual locations, including <https://sourceforge.net/projects/fetchmail/files/branch_6.4/>. DISTRIBUTORS please note OpenSSL's licensing change for OpenSSL 3, and you may want to review COPYING. NOTE that LibreSSL licensing is incompatible with fetchmail's, as there is no GPL clause 2(b) exception for LibreSSL, so LibreSSL can only be used where it is part of the operating system (one of the very few examples is OpenBSD). The source archive is available at: <https://sourceforge.net/projects/fetchmail/files/branch_6.4/fetchmail-6.4.26.tar.xz/download> <https://sourceforge.net/projects/fetchmail/files/branch_6.4/fetchmail-6.4.26.tar.lz/download> The detached GnuPG signature is available at: <https://sourceforge.net/projects/fetchmail/files/branch_6.4/fetchmail-6.4.26.tar.xz.asc/download> <https://sourceforge.net/projects/fetchmail/files/branch_6.4/fetchmail-6.4.26.tar.lz.asc/download> The SHA256 hashes for the tarballs are: SHA256(fetchmail-6.4.26.tar.xz)= 2cc8a94bfaaf794687b2b2147786508f30da598d1ab035c345d731928ac40c9a SHA256(fetchmail-6.4.26.tar.lz)= 18060c9a3aa4b0eb31fdf3543503313a136aac5b979d5a8fcba8e886fbd188ab Here are the release notes: -------------------------------------------------------------------------------- fetchmail-6.4.26 (released 2021-12-26, 31661 LoC): # FIXES: * When using wolfSSL 5.0.0, work around a bug that appears to hit wolfSSL when receiving handshake records while still in SSL_peek(). Workaround is to read 1 byte and cache it, then call SSL_peek() again. This affects only some servers. https://github.com/wolfSSL/wolfssl/issues/4593 # TRANSLATIONS: language translations were updated by this fine person: * sr: Мирослав Николић (Miroslav Nikolić) [Serbian] -------------------------------------------------------------------------------- Happy fetches, Matthias |