courier-imap

Описание:An IMAP daemon designed specifically for maildirs
Лицензия: GPL-3
Домашняя страница:https://www.courier-mta.org/imap/
Расположение:Portage
Легенда:
  • + - стабильный
  • ~ - нестабильный
  • M - замаскированный
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
5.2.4 diff ~ ~ ~ ~ ~ - ~ ~ ~ ~ - ~ ~
5.2.3 diff ~ ~ ~ ~ ~ - ~ ~ ~ ~ - ~ ~
5.2.1-r2 diff ~ ~ ~ ~ ~ - ~ ~ ~ ~ - ~ ~
5.2.1 diff ~ ~ ~ ~ ~ - ~ ~ ~ ~ - ~ ~
5.1.8 diff ~ ~ ~ ~ ~ - ~ ~ ~ ~ - ~ ~
5.1.7 diff ~ ~ ~ ~ ~ - ~ ~ ~ ~ - ~ ~
5.1.4 diff ~ + + ~ ~ - ~ ~ + ~ - + +
5.1.3-r1 diff ~ ~ ~ ~ ~ - ~ ~ ~ ~ - ~ ~
5.1.2-r1 ~ + + + ~ - ~ ~ + ~ - + +

USE флаги

  • berkdb - Add support for sys-libs/db (Berkeley DB for MySQL)
  • debug - Enable extra debug codepaths, like asserts and extra output. If you want to get meaningful backtraces see https://wiki.gentoo.org/wiki/Project:Quality_Assurance/Backtraces
  • fam - Enable FAM (File Alteration Monitor) support
  • gdbm - Add support for sys-libs/gdbm (GNU database libraries)
  • gnutls - Prefer net-libs/gnutls as SSL/TLS provider (ineffective with USE=-ssl)
  • ipv6 - Add support for IP version 6
  • selinux - !!internal use only!! Security Enhanced Linux support, this must be set by the selinux profile or breakage will occur
  • trashquota - include deleted messages, and the Trash folder, in the estimated quota usage for maildirs

Советы по безопасности

Дата Опасность Заголовок
около 17 лет высокая Courier-IMAP: Remote execution of arbitrary code
больше 19 лет высокая courier-imap: Remote Format String Vulnerability
около 20 лет средняя Multiple remote buffer overflow vulnerabilities in Courier

Экспортировать в Atom

Спасибо!