Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: fetchmail | Distribution: openSUSE:Factory:zSystems |
Version: 6.4.37 | Vendor: openSUSE |
Release: 1.4 | Build date: Thu Jun 15 18:54:45 2023 |
Group: Unspecified | Build host: s390zp21 |
Size: 2940071 | Source RPM: fetchmail-6.4.37-1.4.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://www.fetchmail.info/ | |
Summary: Full-Featured POP and IMAP Mail Retrieval Daemon |
Fetchmail is a robust and well-documented remote mail retrieval and forwarding utility intended to be used over on-demand TCP/IP links (such as SLIP or PPP connections). Fetchmail retrieves mail from remote mail servers and forwards it to your local machine's delivery system, so it can be read by normal mail user agents, such as mutt, elm, pine, (x)emacs/gnus, or mailx. fetchmailconf, an interactive GUI configurator suitable for end-users, is included in the fetchmailconf package.
GPL-2.0-or-later
* Wed Mar 01 2023 David Anes <david.anes@suse.com> - Update to 6.4.37: * TRANSLATIONS: language translations were updated: - sr [Serbian] * Tue Feb 07 2023 David Anes <david.anes@suse.com> - Update to 6.4.36: * TRANSLATIONS: language translations were updated: - cs, es, fr, ja, pl, ro, sq, sv * Sat Jan 21 2023 Dirk Müller <dmueller@suse.com> - disable opie support * Thu Jan 05 2023 David Anes <david.anes@suse.com> - Update to 6.4.35: * BREAKING CHANGES: - Fetchmail now warns about OpenSSL before 1.1.1s or 3.0.7, and rejects wolfSSL older than 5.5.0. * Updated Swedish and Esperanto translations. * Fri Oct 21 2022 David Anes <david.anes@suse.com> - Remove stale requires to python-rpm-macros. * Mon Oct 17 2022 David Anes <david.anes@suse.com> - Update to 6.4.34: * Bugfixes: - When an SMTP receiver refuses delivery, a message would be deleted from the mail store in spite of a softbounce option that is enabled. * Translations: - Updated Serbian translation * Thu Sep 01 2022 Matej Cepl <mcepl@suse.com> - Update to 6.4.33: - Turns out the snapd version of HTMLDOC 1.9.16 is broken, so I have added a wrapper script that uses the flatpak version of HTMLDOC, for the benefit of rebuilding on distros that do not ship HTMLDOC natively. - Remove upstreamed 44-uncorrupt_runfetchmail.patch * Wed Aug 31 2022 Stefan Schubert <schubi@suse.com> - Migration to /usr/etc: Saving user changed configuration files in /etc and restoring them while an RPM update. * Sat Jul 30 2022 Matej Cepl <mcepl@suse.com> - Update to 6.4.32: * Use configure to find rst2html, some systems install it only with .py suffix, others only without, and some install both. * Update README.maintainer * Translations updated. - Reapplied patches - Add 44-uncorrupt_runfetchmail.patch to clean up some contrib/ scripts (gl#fetchmail/fetchmail#44). * Mon Jul 18 2022 David Anes <david.anes@suse.com> - update to 6.4.31 * Bugfixes: - Try to fix ./configure --with-ssl=... for systems that have multiple OpenSSL versions installed. Issues reported by Dennis Putnam. - The netrc parser now reports its errors to syslog or logfile when appropriate, previously it would always log to stderr. - Add error checking to .netrc parser. * Changes: - manpage: use .UR/.UE macros instead of .URL for URIs. - manpage: fix contractions. Found with FreeBSD's igor tool. - manpage: HTML now built with pandoc -> python-docutils (manServer.pl was dropped) * Tue Jun 21 2022 Stefan Schubert <schubi@suse.com> - Moved logrotate files from user specific directory /etc/logrotate.d to vendor specific directory /usr/etc/logrotate.d. * Thu Apr 28 2022 David Anes <david.anes@suse.com> - update to 6.4.30: * Breaking changes: - Bump wolfSSL minimum required version to 5.2.0 to pull in security fix. * Changes: - Using OpenSSL 1.* before 1.1.1n elicits a compile-time warning. - Using OpenSSL 3.* before 3.0.2 elicits a compile-time warning. - configure.ac was tweaked in order to hopefully fix cross-compilation issues report, and different patch suggested * Translations.: - ro: Updated Romanian translation. * Sat Apr 09 2022 Dirk Müller <dmueller@suse.com> - update to 6.4.29: * Updated vi [Vietnamese] translation. * Thu Mar 10 2022 David Anes <david.anes@suse.com> - update to 6.4.28: * Updated spanish translation. - fix typos in changelog. * Fri Feb 25 2022 David Anes <david.anes@suse.com> - update to 6.4.27: * Bump wolfSSL minimum required version to 5.1.1 to pull in security fix. * Updated romanian translation. * Wed Jan 12 2022 David Anes <david.anes@suse.com> - fix [bsc#1194203]: * Always create fetchmail group, even if the user is already present, as a leftover from Leap 15.2 upgrade. This may happen also if user is messing with groups/users directly or upgrading from even an older fetchmail versions. * Mon Dec 27 2021 David Anes <david.anes@suse.com> - update to 6.4.26: * When using wolfSSL 5.0.0, work around a bug that appears to hit wolfSSL when receiving handshake records while still in SSL_peek(). Workaround is to read 1 byte and cache it, then call SSL_peek() again. This affects only some servers. * New serbian translation. * Sat Dec 11 2021 Dirk Müller <dmueller@suse.com> - update to 6.4.25: * 6.4.24's workaround for OpenSSL 1.0.2's X509_V_FLAG_TRUSTED_FIRST flag contained a typo and would not kick in properly. * Library and/or rpath setting from configure.ac was fixed. * Added an example systemd unit file and instructions to contrib/systemd/ which runs fetchmail as a daemon with 5-minute poll intervals. * fetchmail can now be used with wolfSSL 5's OpenSSL compatibility layer, see INSTALL and README.SSL. This is considered experimental. Feedback solicited. * Bison 3.8 dropped yytoknum altogether, breaking compilation due to a warning workaround. Remove the cast of yytoknum to void. This may cause a compiler warning to reappear with older Bison versions. * OpenSSL 1.0.2: Workaround for systems that keep the expired DST Root CA X3 certificate in its trust store because OpenSSL by default prefers the untrusted certificate and fails. * For common ssh-based IMAP PREAUTH setups (i. e. those that use a plugin - no matter its contents - and that set auth ssh), change the STARTTLS error message to suggest sslproto '' instead. This is a commonly reported issue after the CVE-2021-39272 fix in 6.4.22. - drop fetchmail-bison-3.8.patch (upstream) - Rebased patches: * fetchmail-add-imap-oauthbearer-support.patch * fetchmail-support-oauthbearer-xoauth2-with-pop3.patch * Tue Nov 09 2021 Dominique Leuenberger <dimstar@opensuse.org> - Add fetchmail-bison-3.8.patch: Fix build with bison 3.8. * Wed Oct 06 2021 Pedro Monreal <pmonreal@suse.com> - Update to 6.4.22: [bsc#1190069, CVE-2021-39272] * OPENSSL AND LICENSING NOTE: - fetchmail 6.4.22 is compatible with OpenSSL 1.1.1 and 3.0.0. OpenSSL's licensing changed between these releases from dual OpenSSL/SSLeay license to Apache License v2.0, which is considered incompatible with GPL v2 by the FSF. For implications and details, see the file COPYING. * SECURITY FIXES: - CVE-2021-39272: fetchmail-SA-2021-02: On IMAP connections, without --ssl and with nonempty --sslproto, meaning that fetchmail is to enforce TLS, and when the server or an attacker sends a PREAUTH greeting, fetchmail used to continue an unencrypted connection. Now, log the error and abort the connection. --Recommendation for servers that support SSL/TLS-wrapped or "implicit" mode on a dedicated port (default 993): use --ssl, or the ssl user option in an rcfile. - On IMAP and POP3 connections, --auth ssh no longer prevents STARTTLS negotiation. - On IMAP connections, fetchmail does not permit overriding a server-side LOGINDISABLED with --auth password any more. - On POP3 connections, the possibility for RPA authentication (by probing with an AUTH command without arguments) no longer prevents STARTTLS negotiation. - For POP3 connections, only attempt RPA if the authentication type is "any". * BUG FIXES: - On IMAP connections, when AUTHENTICATE EXTERNAL fails and we have received the tagged (= final) response, do not send "*". - On IMAP connections, AUTHENTICATE EXTERNAL without username will properly send a "=" for protocol compliance. - On IMAP connections, AUTHENTICATE EXTERNAL will now check if the server advertised SASL-IR (RFC-4959) support and otherwise refuse (fetchmail <= 6.4 has not supported and does not support the separate challenge/response with command continuation) - On IMAP connections, when --auth external is requested but not advertised by the server, log a proper error message. - Fetchmail no longer crashes when attempting a connection with - -plugin "" or --plugout "". - Fetchmail no longer leaks memory when processing the arguments of --plugin or --plugout on connections. - On POP3 connections, the CAPAbilities parser is now caseblind. - Fix segfault on configurations with "defaults ... no envelope". This is a regression in fetchmail 6.4.3 and happened when plugging memory leaks, which did not account for that the envelope parameter is special when set as "no envelope". The segfault happens in a constant strlen(-1), triggered by trusted local input => no vulnerability. - Fix program abort (SIGABRT) with "internal error" when invalid sslproto is given with OpenSSL 1.1.0 API compatible SSL implementations. * CHANGES: - IMAP: When fetchmail is in not-authenticated state and the server volunteers CAPABILITY information, use it and do not re-probe. (After STARTTLS, fetchmail must and will re-probe explicitly.) - For typical POP3/IMAP ports 110, 143, 993, 995, if port and --ssl option do not match, emit a warning and continue. - fetchmail.man and README.SSL were updated in line with RFC-8314/8996/8997 recommendations to prefer Implicit TLS (--ssl/ssl) and TLS v1.2 or newer, placing --sslproto tls1.2+ more prominently. The defaults shall not change between 6.4.X releases for compatibility. * Rebase patches: fetchmail-add-imap-oauthbearer-support.patch fetchmail-add-query_to64_outsize-utility-function.patch fetchmail-support-oauthbearer-xoauth2-with-pop3.patch * Tue Sep 14 2021 Johannes Segitz <jsegitz@suse.com> - Added hardening to systemd service(s) (bsc#1181400). Modified: * fetchmail.service * Tue Aug 24 2021 Pedro Monreal <pmonreal@suse.com> - Update to 6.4.21: * REGRESSION FIX: The new security fix in 6.4.20 for CVE-2021-36386 caused truncation of messages logged to buffered outputs, predominantly --logfile. * Thu Jul 29 2021 Pedro Monreal <pmonreal@suse.com> - Update to 6.4.20: [bsc#1188875, CVE-2021-36386] * CVE-2021-36386: DoS or information disclosure in some configurations. When a log message exceeds c. 2 kByte in size, for instance, with very long header contents, and depending on verbosity option, fetchmail can crash or misreport each first log message that requires a buffer reallocation. fetchmail then reallocates memory and re-runs vsnprintf() without another call to va_start(), so it reads garbage. The exact impact depends on many factors around the compiler and operating system configurations used and the implementation details of the stdarg.h interfaces of the two functions mentioned before. * Thu May 13 2021 Jeff Mahoney <jeffm@suse.com> - Backported support for OAUTH2 authentication from Fetchmail 7.0. - add imap oauthbearer support - support oauthbearer/xoauth2 with pop3 - add passwordfile and passwordfd options - add contrib/fetchnmail-oauth2.py token acquisition utility - FAQ: list gmail options including oauthbearer and app password - give each ctl it's own copy of password - re-read passwordfile on every poll - add query_to64_outsize() utility function - Chase and integrate interface change. - oauth2.c: calculate and pass in correct buffer size to to64frombits() - Increase max password length to handle oauth tokens - Bump max. passwordlen to 10000 bytes. - Add README.OAUTH2 - Added patches: * fetchmail-add-imap-oauthbearer-support.patch * fetchmail-support-oauthbearer-xoauth2-with-pop3.patch * fetchmail-add-passwordfile-and-passwordfd-options.patch * fetchmail-add-contrib-fetchnmail-oauth2.py-token-acquisition-u.patch * fetchmail-FAQ-list-gmail-options-including-oauthbearer-and-app.patch * fetchmail-give-each-ctl-it-s-own-copy-of-password.patch * fetchmail-re-read-passwordfile-on-every-poll.patch * fetchmail-add-query_to64_outsize-utility-function.patch * fetchmail-chase-and-integrate-interface-change.patch * fetchmail-oauth2-c-calculate-and-pass-in-correct-buffer-size-to-to64frombits.patch * fetchmail-increase-max-password-length-to-handle-oauth-tokens.patch * fetchmail-bump-max-passwordlen-to-1bytes.patch * fetchmail-add-readme-oauth2-issue-27.patch * Sat May 08 2021 Dirk Müller <dmueller@suse.com> - update to 6.4.19: * fetchmailconf: properly catch and report option parsing errors * LMTP: do not try to validate the last component of a UNIX-domain LMTP socket as though it were a TCP port. * Tue Apr 06 2021 Dirk Müller <dmueller@suse.com> - update to 6.4.18: * fetchmailconf: fetchmail 6.4.16 added --sslcertfile to the configuration dump, but fetchmailconf support was incomplete in Git 7349f124 and it could not parse sslcertfile, thus the user settings editor came up empty with console errors printed. Fix configuration parser in fetchmailconf. * fetchmailconf: do not require fetchmail for -V. do not require Tk (Tkinter) for -d option. This is to fail more gracefully on incomplete installs. * TLS code: remove OPENSSL_NO_DEPRECATED macros to avoid portability issues with OpenSSL v3 - these are for development purposes, not production. * TLS futureproofing: use SSL_use_PrivateKey_file instead of SSL_use_RSAPrivateKey_file, the latter will be deprecated with OpenSSL v3, and the user's key file might be something else than RSA. * IMAP client: it used to leak memory for username and password when trying the LOGIN (password-based) authentication and encountered a timeout situation. * dist-tools/getstats.py: also counts lines in *.py files, shown above. * fetchmail.man: now mentions that you may need to add --ssl when specifying a TLS-wrapped port. * fetchmailconf: --version (-V) now prints the Python version in use. * Mon Mar 01 2021 Pedro Monreal <pmonreal@suse.com> - update to 6.4.16: * fetchmail's --configdump, and fetchmailconf, lacked support for the sslcertfile option. * fetchmail --version [fetchmail -V] now queries and prints the SSL/TLS library's "SSL default trusted certificate" file or directory (mind the word "default"), where the OpenSSL-compatible TLS implementation will look for trusted root, meaning certification authority (CA), certificates. * fetchmail --version now prints version of the OpenSSL library that it was compiled against, and that it is using at runtime, and also the OPENSSL_DIR and OPENSSL_ENGINES_DIR (if available). * Mon Jan 04 2021 Dirk Müller <dmueller@suse.com> - update to 6.4.15: * Fix a typo in the manual page reported by David McKelvie. * Fix cross-compilation with openssl, by Fabrice Fontaine. Merge request !23. * Fix truncation of SMTP PLAIN AUTH with ^ in credentials, by Earl Chew. * Sat Dec 19 2020 Dirk Mueller <dmueller@suse.com> - update to 6.4.14: * sr: Мирослав Николић (Miroslav Nikolić) [Serbian] * Errors about lock file (= pidfile) creation could be lost in daemon configurations (-d option, or set daemon) when using syslog. Now they are also logged to syslog. Found verifying a pidfile creation issue on 6.4.12 that was previously reported by Alex Hall of Automatic Distributors. * If the lock file cannot be removed (no write permission on directory), try to truncate it, and if that fails, report error. * If the pidfile was non-default, fetchmail -q or --quit would malfunction and claim no other fetchmail were running, because it did not read the configuration files or merge the command line options, thus it would look for the PID in the wrong file. * Fri Dec 18 2020 Thorsten Kukuk <kukuk@suse.com> - Don't require systemd - Use tmpfiles for all files - Use systemd macro for tmpfiles - Don't delete home directory if the user stays - Use sysusers config to create system user * Fri Sep 04 2020 Dirk Mueller <dmueller@suse.com> - update to 6.4.12: [#] REGRESSION FIX: * configure: fetchmail 6.4.9 and 6.4.10 would miss checking for TLS v1.2 and TLS v1.3 support if AC_LIB_LINKFLAGS came up with something such as /path/to/libssl.so, rather than -lssl. (For instance on FreeBSD) * configure: fetchmail 6.4.9's configure was unable to pick up OpenSSL if it wasn't announced by pkg-config, for instance, on FreeBSD * Fri Aug 28 2020 Callum Farmer <callumjfarmer13@gmail.com> - De-hardcode /usr/lib path for launch executable (bsc#1174075) - Spec file cleanups * Wed Aug 26 2020 Pedro Monreal Gonzalez <pmonreal@suse.com> - Update fetchmail.keyring file - Use %{_prefix}/lib instead of %{_libexecdir} * Mon Aug 24 2020 Dirk Mueller <dmueller@suse.com> - update to 6.4.8: * Add a test program fm_realpath, and a t.realpath script, neither to be installed. These will test resolution of the current working directory. * TRANSLATION UPDATES * Plug memory leaks when parts of the configuration (defaults, rcfile, command line) override one another. * fetchmail terminated the placeholder command string too late and included garbage from the heap at the end of the string. Workaround: don't use place- holders %h or %p in the --plugin string. Bug added in 6.4.0 when merging Gitlab merge request !5 in order to fix an input buffer overrun. Faulty commit 418cda65f752e367fa663fd13884a45fcbc39ddd. * Fetchmail now checks for errors when trying to read the .idfile * Fetchmail's error messages that reports that the defaults entry isn't the first was made more precise. It could be misleading if there was a poll or skip statement before the defaults. * Fetchmail documentation was updated to require OpenSSL 1.1.1. OpenSSL 1.0.2 reached End Of Life status at the end of the year 2019. Fetchmail will tolerate, but warn about, 1.0.2 for now on the assumption that distributors backport security fixes as the need arises. Fetchmail will also warn if another SSL library that is API-compatible with OpenSSL lacks TLS v1.3 support. * If the trust anchor is missing, fetchmail refers the user to README.SSL. * The AC_DECLS(getenv) check was removed, its only user was broken and not accounting for that AC_DECLS always defines HAVE_DECL_... to 0 or 1, so fetchmail never declared a missing getenv() symbol (it was testing with [#]ifdef). Remove the backup declaration. getenv is mandated by SUSv2 anyways. * fetchmailconf now supports Python 3 and currently requires the "future" package, see https://pypi.org/project/future/. * fetchmailconf: The minimum supported version is now Python 2.7.13, but it is recommended to use at least 2.7.16 (due to its massive SSL updates). Older Python versions may check SSL certificates not strictly enough, which may cause fetchmail to complain later, if the certificate verify fails. * fetchmailconf now autoprobes SSL-wrapped connections (ports 993 and 995 for IMAP and POP3) as well and by preference. * fetchmailconf now defaults newly created users to "ssl" if either of the existing users sets ssl, or if the server has freshly been probed and found supporting ssl. There is a caveat: adding a user to an existing server without probing it again may skip adding ssl. (This does not prevent STARTTLS.) * Fix three bugs in fetchmail.man (one unterminated string to .IP macro, one line that ran into a .PP macro, .TH date format), and remove one .br request from inside the table, which is unsupported by FreeBSD 12's mandoc(1) formatter. * Further man page fixes and additions by Chris Mayo and Gregor Zattler. * When evaluating the need for STARTTLS in non-default configurations (SSL certificate validation turned off), fetchmail would only consider --sslproto tls1 as requiring STARTTLS, now all non-empty protocol versions do. * fetchmailconf now properly writes "no sslcertck" if sslcertck is disabled. * fetchmailconf now catches and reports OS errors (including DNS errors) when autoprobing. * fetchmailconf received a host of other bugfixes, see the Git commit log. * Wed Aug 19 2020 Dominique Leuenberger <dimstar@opensuse.org> - Fix invalid usage of libexecdir where %_tmpfilesdir was meant to be used. * Sun Feb 02 2020 Thorsten Kukuk <kukuk@suse.com> - pwdutils is gone long time ago * Wed Jan 08 2020 Ondřej Súkup <mimi.vx@gmail.com> - switch to python3 - don't require python*-devel
/etc/fetchmailrc /usr/bin/fetchmail /usr/etc/logrotate.d/fetchmail /usr/lib/systemd/system/fetchmail.service /usr/lib/sysusers.d/fetchmail.conf /usr/lib/tmpfiles.d/fetchmail.conf /usr/libexec/fetchmail-systemd-exec /usr/sbin/rcfetchmail /usr/share/doc/packages/fetchmail /usr/share/doc/packages/fetchmail/FAQ /usr/share/doc/packages/fetchmail/FEATURES /usr/share/doc/packages/fetchmail/Mailbox-Names-UTF7.html /usr/share/doc/packages/fetchmail/Mailbox-Names-UTF7.txt /usr/share/doc/packages/fetchmail/NEWS /usr/share/doc/packages/fetchmail/NOTES /usr/share/doc/packages/fetchmail/OLDNEWS /usr/share/doc/packages/fetchmail/README /usr/share/doc/packages/fetchmail/README.NTLM /usr/share/doc/packages/fetchmail/README.OAUTH2 /usr/share/doc/packages/fetchmail/README.SSL /usr/share/doc/packages/fetchmail/README.SSL-SERVER /usr/share/doc/packages/fetchmail/TODO /usr/share/doc/packages/fetchmail/contrib /usr/share/doc/packages/fetchmail/contrib/007705.html /usr/share/doc/packages/fetchmail/contrib/007713.html /usr/share/doc/packages/fetchmail/contrib/008523.html /usr/share/doc/packages/fetchmail/contrib/010015.html /usr/share/doc/packages/fetchmail/contrib/PopDel.manual /usr/share/doc/packages/fetchmail/contrib/PopDel.py /usr/share/doc/packages/fetchmail/contrib/README /usr/share/doc/packages/fetchmail/contrib/README.getmail /usr/share/doc/packages/fetchmail/contrib/README.mold_remover /usr/share/doc/packages/fetchmail/contrib/debian_rc /usr/share/doc/packages/fetchmail/contrib/delete-later /usr/share/doc/packages/fetchmail/contrib/delete-later.README /usr/share/doc/packages/fetchmail/contrib/domino /usr/share/doc/packages/fetchmail/contrib/fetchmail-mode.el /usr/share/doc/packages/fetchmail/contrib/fetchmail-oauth2.py /usr/share/doc/packages/fetchmail/contrib/fetchmail.logrotate /usr/share/doc/packages/fetchmail/contrib/fetchmaildistrib /usr/share/doc/packages/fetchmail/contrib/fetchmailnochda.pl /usr/share/doc/packages/fetchmail/contrib/fetchsetup /usr/share/doc/packages/fetchmail/contrib/fetchspool /usr/share/doc/packages/fetchmail/contrib/getfetchmail /usr/share/doc/packages/fetchmail/contrib/getfetchmail.pl /usr/share/doc/packages/fetchmail/contrib/getmail /usr/share/doc/packages/fetchmail/contrib/gotmail /usr/share/doc/packages/fetchmail/contrib/gotmail.awk /usr/share/doc/packages/fetchmail/contrib/gotmail.conf /usr/share/doc/packages/fetchmail/contrib/gotmail.html.awk /usr/share/doc/packages/fetchmail/contrib/ip-up /usr/share/doc/packages/fetchmail/contrib/login /usr/share/doc/packages/fetchmail/contrib/logout /usr/share/doc/packages/fetchmail/contrib/maildaemon /usr/share/doc/packages/fetchmail/contrib/mailqueue.pl /usr/share/doc/packages/fetchmail/contrib/mold_remover.py /usr/share/doc/packages/fetchmail/contrib/multidrop /usr/share/doc/packages/fetchmail/contrib/novell /usr/share/doc/packages/fetchmail/contrib/poptest /usr/share/doc/packages/fetchmail/contrib/preauth-harness /usr/share/doc/packages/fetchmail/contrib/rawlog.patch /usr/share/doc/packages/fetchmail/contrib/redhat_rc /usr/share/doc/packages/fetchmail/contrib/runfetchmail /usr/share/doc/packages/fetchmail/contrib/sm-hybrid /usr/share/doc/packages/fetchmail/contrib/start_dynamic_ppp /usr/share/doc/packages/fetchmail/contrib/systemd /usr/share/doc/packages/fetchmail/contrib/systemd/README /usr/share/doc/packages/fetchmail/contrib/systemd/README.systemd /usr/share/doc/packages/fetchmail/contrib/systemd/fetchmail.service /usr/share/doc/packages/fetchmail/contrib/toprocmail /usr/share/doc/packages/fetchmail/contrib/zsh-completion /usr/share/doc/packages/fetchmail/design-notes.html /usr/share/doc/packages/fetchmail/esrs-design-notes.html /usr/share/doc/packages/fetchmail/fetchmail-EN-2010-03.txt /usr/share/doc/packages/fetchmail/fetchmail-FAQ.html /usr/share/doc/packages/fetchmail/fetchmail-FAQ.pdf /usr/share/doc/packages/fetchmail/fetchmail-SA-2005-01.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2005-02.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2005-03.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2006-01.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2006-02.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2006-03.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2007-01.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2007-02.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2008-01.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2009-01.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2010-01.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2010-02.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2011-01.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2012-01.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2012-02.txt /usr/share/doc/packages/fetchmail/fetchmail-SA-2021-01.txt /usr/share/doc/packages/fetchmail/fetchmail-features.html /usr/share/doc/packages/fetchmail/fetchmail-man.html /usr/share/doc/packages/fetchmail/todo.html /usr/share/fillup-templates/sysconfig.fetchmail /usr/share/licenses/fetchmail /usr/share/licenses/fetchmail/COPYING /usr/share/locale/cs/LC_MESSAGES/fetchmail.mo /usr/share/locale/de/LC_MESSAGES/fetchmail.mo /usr/share/locale/eo/LC_MESSAGES/fetchmail.mo /usr/share/locale/es/LC_MESSAGES/fetchmail.mo /usr/share/locale/fr/LC_MESSAGES/fetchmail.mo /usr/share/locale/ja/LC_MESSAGES/fetchmail.mo /usr/share/locale/pl/LC_MESSAGES/fetchmail.mo /usr/share/locale/ro/LC_MESSAGES/fetchmail.mo /usr/share/locale/sq/LC_MESSAGES/fetchmail.mo /usr/share/locale/sr/LC_MESSAGES/fetchmail.mo /usr/share/locale/sv/LC_MESSAGES/fetchmail.mo /usr/share/locale/vi/LC_MESSAGES/fetchmail.mo /usr/share/man/man1/fetchmail.1.gz /var/lib/fetchmail /var/log/fetchmail
Generated by rpm2html 1.8.1
Fabrice Bellet, Sat Mar 9 12:50:11 2024