| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: mutt-lang | Distribution: openSUSE Tumbleweed |
| Version: 2.2.16 | Vendor: openSUSE |
| Release: 3.2 | Build date: Wed Jan 21 11:50:54 2026 |
| Group: System/Localization | Build host: reproducible |
| Size: 2945901 | Source RPM: mutt-2.2.16-3.2.src.rpm |
| Packager: https://bugs.opensuse.org | |
| Url: https://www.mutt.org | |
| Summary: Languages for Mutt | |
Provides translations to the package mutt.
GPL-2.0-or-later
* Wed Jan 21 2026 Dr. Werner Fink <werner@suse.de>
- In Leap 15.5/15.7 latest postfix is currently broken, let's
try to skip smtp_daemon build reqirement
* Thu Jan 15 2026 Dr. Werner Fink <werner@suse.de>
- Remove dependency on update-desktop-files (jsc#PED-15228)
* Sat Nov 22 2025 olaf@aepfle.de
- Update to mutt 2.2.16 (Bug fix release)
* fixing an IMAP search/limit bug
* Thu Aug 07 2025 Dr. Werner Fink <werner@suse.de>
- Exclude sample ca-bundle.crt as it is outdated (bsc#1246321)
* Wed May 21 2025 Dr. Werner Fink <werner@suse.de>
- Update to mutt 2.2.14 (Bug fix release)
* fixing a couple possible crashes, in GPGME and with IMAP when
logging out
* and correcting a small issue with unnecessary encoding of "."
in attachment names (2231 encoding).
- Make doc info and hmtl file build without network
- Set default mail spool files
* Mon Jul 15 2024 Dr. Werner Fink <werner@suse.de>
- Remove patch aw.listreply.diff as it conflicts with builtin
<list-reply> feature
- Build and install pdf doc
* Mon Jul 15 2024 Dr. Werner Fink <werner@suse.de>
- Require some cyrus-sasl plugins to make the cyrus-sasl feature
of mutt function (boo#1227731)
* Mon Jun 03 2024 Dr. Werner Fink <werner@suse.de>
- Update to mutt 2.2.13 (Bug fix release)
* Fix smtp client to respect $use_envelope_from option. The code
was only looking to see if $envelope_from_address had a value,
not if $use_envelope_from was set.
Add extra safety checks to make sure the mailbox value isn't NULL.
* Fix smtp client $envelope_from_address possible dangling pointer.
If the account-hook invoked by mutt_conn_find() modifies
$envelope_from_address, envfrom could point no longer point to the
address.
Move the mutt_conn_find() before the code that determines the envelope
from address.
* Fri Feb 23 2024 pgajdos@suse.com
- Use %patch -P N instead of deprecated %patchN.
* Tue Feb 20 2024 Dr. Werner Fink <werner@suse.de>
- Only suggest smtp daemon at runtime. Nevertheless if not
installed user will face a a warning.
- Move /etc/Muttrc to /usr/share/mutt/Muttrc
* Mon Oct 09 2023 Dr. Werner Fink <werner@suse.de>
- Require a smtp daemon at build and runtime to work around
missing system /var/mail/ directory (boo#1216035)
* Wed Sep 27 2023 Dr. Werner Fink <werner@suse.de>
- Submit latest mutt 2.2.12 to SLE-15-SP6 for jira#PED-5580
* Drop patches for boo#1172906, boo#1172935, CVE-2020-14093,
and CVE-2020-14154 now upstream
- 3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01.patch
+ Prevent possible IMAP MITM via PREAUTH response.
- mutt-1.10.1-backport-mutt_ssl_gnutls-1.14.3.dif
to port mutt_ssl_gnutls.c from mutt 1.14.3 back
+ expired certs not properly rejected with GnuTLS
+ Side effect is support of TLSv1_3 is supported by gnutls
* Drop patch for bsc#1173197 c547433cdf2e79191b15c6932c57f1472bfb5ff4.dif
now upstream
- Fix CVE-2020-14954: STARTTLS buffering issue allowing man
in the middle attack of IMAP, SMTP and POP3
* Drop patch for bsc#1179035, CVE-2020-28896.patch now upstream
- incomplete connection termination could lead to sending
credentials over unencrypted connections
* Drop patch for bsc#1179113 and boo#1179461 nofreeze-c72f740a.patch
now upstream
- Avoid that message with a million tiny parts can freeze MUA
for several minutes
* Drop patch for bsc#1181221, CVE-2021-3181 mutt-colon.patch now
upstream
- recipient parsing memory leak. This patch combines three
smaller commits
* Drop patch for bsc#1198518, CVE-2022-1328 uudecode-e5ed080c.patch
- fix a buffer overflow in uudecoder
* Drop patches now upstream
- CVE-2023-4874-part1.patch (bsc#1215189 for CVE-2023-4874)
- CVE-2023-4874-part2.patch (bsc#1215189 for CVE-2023-4874)
- CVE-2023-4875.patch (bsc#1215191 for CVE-2023-4875)
* Tue Sep 12 2023 Dr. Werner Fink <werner@suse.de>
- Update to mutt 2.2.12 (bsc#1215189 for CVE-2023-4874,
bsc#1215191 for CVE-2023-4875)
* 2.2.12 (2023-09-09):
Bug fix release.
* 2.2.11 (2023-08-18):
Bug fix release.
* Mon Apr 17 2023 Dr. Werner Fink <werner@suse.de>
- Use astrix instead of german u umlaut as point
* Mon Apr 03 2023 Dirk Müller <dmueller@suse.com>
- update to 2.2.10:
* Bug fix release.
* $message_id_format %r and %z expandos use a URL-safe Base64 encoding:
'-' and '_' instead of '+' and '/'.
/usr/share/locale/bg/LC_MESSAGES/mutt.mo /usr/share/locale/ca/LC_MESSAGES/mutt.mo /usr/share/locale/cs/LC_MESSAGES/mutt.mo /usr/share/locale/da/LC_MESSAGES/mutt.mo /usr/share/locale/de/LC_MESSAGES/mutt.mo /usr/share/locale/el/LC_MESSAGES/mutt.mo /usr/share/locale/eo/LC_MESSAGES/mutt.mo /usr/share/locale/es/LC_MESSAGES/mutt.mo /usr/share/locale/et/LC_MESSAGES/mutt.mo /usr/share/locale/eu/LC_MESSAGES/mutt.mo /usr/share/locale/fi/LC_MESSAGES/mutt.mo /usr/share/locale/fr/LC_MESSAGES/mutt.mo /usr/share/locale/ga/LC_MESSAGES/mutt.mo /usr/share/locale/gl/LC_MESSAGES/mutt.mo /usr/share/locale/hu/LC_MESSAGES/mutt.mo /usr/share/locale/id/LC_MESSAGES/mutt.mo /usr/share/locale/it/LC_MESSAGES/mutt.mo /usr/share/locale/ja/LC_MESSAGES/mutt.mo /usr/share/locale/ko/LC_MESSAGES/mutt.mo /usr/share/locale/lt/LC_MESSAGES/mutt.mo /usr/share/locale/nl/LC_MESSAGES/mutt.mo /usr/share/locale/pl/LC_MESSAGES/mutt.mo /usr/share/locale/pt_BR/LC_MESSAGES/mutt.mo /usr/share/locale/ru/LC_MESSAGES/mutt.mo /usr/share/locale/sk/LC_MESSAGES/mutt.mo /usr/share/locale/sv/LC_MESSAGES/mutt.mo /usr/share/locale/tr/LC_MESSAGES/mutt.mo /usr/share/locale/uk/LC_MESSAGES/mutt.mo /usr/share/locale/zh_CN/LC_MESSAGES/mutt.mo /usr/share/locale/zh_TW/LC_MESSAGES/mutt.mo
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed Apr 1 23:20:22 2026