Debian Package Tracker
Register | Log in
Subscribe

courier

Choose email to subscribe with

general
  • source: courier (main)
  • version: 1.0.16-3
  • maintainer: Markus Wanner (DMD)
  • arch: all any
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.76.3-5+deb9u1
  • oldstable: 1.0.6-1
  • stable: 1.0.16-3
  • testing: 1.0.16-3
  • unstable: 1.0.16-3
versioned links
  • 0.76.3-5+deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.0.6-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.0.16-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • courier-base (7 bugs: 0, 2, 5, 0)
  • courier-doc (1 bugs: 0, 1, 0, 0)
  • courier-faxmail
  • courier-imap (37 bugs: 0, 32, 5, 0)
  • courier-ldap (3 bugs: 0, 2, 1, 0)
  • courier-mlm (4 bugs: 1, 3, 0, 0)
  • courier-mta (25 bugs: 0, 20, 5, 0)
  • courier-pcp
  • courier-pop (3 bugs: 0, 1, 2, 0)
  • courier-webadmin (5 bugs: 0, 4, 1, 0)
  • sqwebmail (16 bugs: 0, 10, 6, 0)
action needed
Marked for autoremoval on 08 June due to courier-unicode: #1010145 high
Version 1.0.16-3 of courier is marked for autoremoval from testing on Wed 08 Jun 2022. It depends (transitively) on courier-unicode, affected by #1010145. You should try to prevent the removal by fixing these RC bugs.
Created: 2022-05-02 Last update: 2022-05-20 13:08
A new upstream version is available: 1.1.8 high
A new upstream version 1.1.8 is available, you should consider packaging it.
Created: 2022-01-26 Last update: 2022-05-20 12:35
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2021-38084: An issue was discovered in the POP3 component of Courier Mail Server before 1.1.5. Meddler-in-the-middle attackers can pipeline commands after the POP3 STLS command, injecting plaintext commands into an encrypted user session.
Created: 2021-08-04 Last update: 2021-12-05 06:30
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2021-38084: An issue was discovered in the POP3 component of Courier Mail Server before 1.1.5. Meddler-in-the-middle attackers can pipeline commands after the POP3 STLS command, injecting plaintext commands into an encrypted user session.
Created: 2021-08-15 Last update: 2021-12-05 06:30
Depends on packages which need a new maintainer normal
The packages that courier depends on which need a new maintainer are:
  • dh-exec (#851746)
    • Build-Depends: dh-exec
  • couriergrey (#849562)
    • Suggests: couriergrey
Created: 2019-11-22 Last update: 2022-05-20 13:07
5 bugs tagged patch in the BTS normal
The BTS contains patches fixing 5 bugs, consider including or untagging them.
Created: 2021-08-14 Last update: 2022-05-20 12:30
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2021-01-06 Last update: 2022-05-19 22:33
lintian reports 42 warnings normal
Lintian reports 42 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2021-04-11 Last update: 2021-10-13 21:31
RFH: The maintainer is looking for help with this package. normal
The current maintainer is looking for someone who can help with the maintenance of this package. If you are interested in this package, please consider helping out. One way you can help is offer to be a co-maintainer or triage bugs in the BTS. Please see bug number #978755 for more information.
Created: 2020-12-31 Last update: 2020-12-31 12:07
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • courier-doc could be marked Multi-Arch: foreign
Created: 2016-09-14 Last update: 2022-05-20 13:08
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2022-03-14 Last update: 2022-03-14 08:25
1 low-priority security issue in buster low

There is 1 open security issue in buster.

1 issue left for the package maintainer to handle:
  • CVE-2021-38084: (needs triaging) An issue was discovered in the POP3 component of Courier Mail Server before 1.1.5. Meddler-in-the-middle attackers can pipeline commands after the POP3 STLS command, injecting plaintext commands into an encrypted user session.

You can find information about how to handle this issue in the security team's documentation.

Created: 2021-08-04 Last update: 2021-12-05 06:30
1 low-priority security issue in bullseye low

There is 1 open security issue in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2021-38084: (needs triaging) An issue was discovered in the POP3 component of Courier Mail Server before 1.1.5. Meddler-in-the-middle attackers can pipeline commands after the POP3 STLS command, injecting plaintext commands into an encrypted user session.

You can find information about how to handle this issue in the security team's documentation.

Created: 2021-08-14 Last update: 2021-12-05 06:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.1).
Created: 2021-08-18 Last update: 2022-05-11 23:25
news
[rss feed]
  • [2021-04-12] courier 1.0.16-3 MIGRATED to testing (Debian testing watch)
  • [2021-03-07] Accepted courier 1.0.16-3 (source) into unstable (Markus Wanner)
  • [2021-03-05] Accepted courier 1.0.16-2 (source) into unstable (Markus Wanner)
  • [2021-03-01] Accepted courier 1.0.16-1 (source) into unstable (Markus Wanner)
  • [2021-02-17] Accepted courier 1.0.15-1 (source) into unstable (Markus Wanner)
  • [2021-02-10] courier 1.0.14-2 MIGRATED to testing (Debian testing watch)
  • [2021-02-07] Accepted courier 1.0.14-2 (source) into unstable (Markus Wanner)
  • [2021-01-06] courier 1.0.14-1 MIGRATED to testing (Debian testing watch)
  • [2020-12-28] Accepted courier 1.0.14.20201130-1 (source) into experimental (Markus Wanner)
  • [2020-12-28] Accepted courier 1.0.14-1 (source) into unstable (Markus Wanner)
  • [2019-10-13] courier REMOVED from testing (Debian testing watch)
  • [2019-02-11] courier 1.0.6-1 MIGRATED to testing (Debian testing watch)
  • [2019-02-09] Accepted courier 0.76.3-5+deb9u1 (source) into proposed-updates->stable-new, proposed-updates (Andreas Beckmann)
  • [2019-02-06] Accepted courier 1.0.6-1 (source amd64 all) into unstable (Markus Wanner)
  • [2019-02-04] courier 1.0.5-2 MIGRATED to testing (Debian testing watch)
  • [2019-01-27] Accepted courier 1.0.5-2 (source amd64 all) into unstable (Markus Wanner)
  • [2019-01-14] Accepted courier 1.0.5-1 (source) into unstable (Markus Wanner)
  • [2017-09-24] courier REMOVED from testing (Debian testing watch)
  • [2017-09-13] Accepted courier 0.78.0-2 (source) into unstable (Markus Wanner)
  • [2017-09-12] Accepted courier 0.78.0-1 (source amd64 all) into unstable (Markus Wanner)
  • [2017-08-15] Accepted courier 0.77.0-3 (source all) into unstable (Markus Wanner)
  • [2017-08-10] Accepted courier 0.77.0-1 (source all) into unstable (Markus Wanner)
  • [2017-05-19] courier 0.76.3-5 MIGRATED to testing (Debian testing watch)
  • [2017-05-08] Accepted courier 0.76.3-5 (source amd64 all) into unstable (Markus Wanner)
  • [2017-01-01] courier 0.76.3-4 MIGRATED to testing (Debian testing watch)
  • [2016-12-21] courier 0.76.3-3 MIGRATED to testing (Debian testing watch)
  • [2016-12-21] Accepted courier 0.76.3-4 (source) into unstable (Ondřej Surý)
  • [2016-12-06] Accepted courier 0.76.3-3 (source amd64 all) into unstable (Ondřej Surý)
  • [2016-11-29] Accepted courier 0.76.3-2 (source) into unstable (Ondřej Surý)
  • [2016-11-06] courier 0.76.3-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 153 156
  • RC: 1
  • I&N: 110 112
  • M&W: 42 43
  • F&P: 0
  • patch: 5
links
  • homepage
  • lintian (0, 42)
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (92, 100)
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.0.16-3build3
  • 34 bugs (2 patches)

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing