split-protocols.patch
fix-mail_plugin_dir-default.patch
ssl-cert-location.patch
tcpwrapper.patch
default-mail_location.patch
exampledir.patch
mboxlocking.patch
dovecot_name.patch
ssl-dh-params-location.patch
lib-master-test-event-stats-Use-PRIu64-format.patch
avoid-double-closing-mysql.patch
CVE-2019-7524
CVE-2019-10691
CVE-2019-11494
CVE-2019-11499
lib-imap-Don-t-accept-strings-with-NULs.patch
lib-imap-Make-sure-str_unescape-won-t-be-writing-pas.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0001-lib-smtp-smtp-server-cmd-vrfy-Restructure-parameter-.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0002-lib-smtp-smtp-syntax-Do-not-allow-NULL-return-parame.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0003-lib-smtp-smtp-syntax-Do-not-allow-NULL-return-parame.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0004-lib-smtp-syntax-Fix-smtp_ehlo_line_parse-to-also-rec.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0005-lib-smtp-smtp-syntax-Do-not-allow-NULL-return-parame.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0006-lib-smtp-smtp-syntax-Return-0-for-smtp_string_parse-.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0007-lib-smtp-Add-tests-for-smtp_string_parse-and-smtp_st.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0008-lib-smtp-test-smtp-server-errors-Add-tests-for-VRFY-.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0009-lib-smtp-server-command-Move-core-of-smtp_server_com.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0010-lib-smtp-smtp-server-command-Assign-cmd-reg-immediat.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0011-lib-smtp-smtp-server-command-Guarantee-that-non-dest.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0012-lib-smtp-smtp-server-command-Perform-initial-command.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0013-lib-smtp-smtp-server-connection-Hold-a-command-refer.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0014-lib-smtp-test-smtp-server-errors-Add-tests-for-large.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0015-lib-smtp-smtp-address-Don-t-return-NULL-from-smtp_ad.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0016-lib-smtp-smtp-address-Don-t-recognize-an-address-wit.patch
CVE-2020-10957_CVE-2020-10958_CVE-2020-10967/0017-lmtp-lmtp-commands-Explicity-prohibit-empty-RCPT-pat.patch
internal-api-updates.patch
CVE-2020-12100/0001-lib-mail-test-message-parser-Add-another-test-for-bo.patch
CVE-2020-12100/0002-lib-mail-test-message-parser-Test-that-children_coun.patch
CVE-2020-12100/0003-lib-mail-Move-message_parser_init_from_parts-handlin.patch
CVE-2020-12100/0004-lib-mail-message-parser-Add-a-message_part_finish-he.patch
CVE-2020-12100/0005-lib-mail-message-parser-Change-message_part_append-t.patch
CVE-2020-12100/0006-lib-mail-message-parser-Optimize-updating-children_c.patch
CVE-2020-12100/0007-lib-mail-message-parser-Optimize-appending-new-part-.patch
CVE-2020-12100/0008-lib-mail-message-parser-Minor-code-cleanup-to-findin.patch
CVE-2020-12100/0009-lib-mail-message-parser-Truncate-excessively-long-MI.patch
CVE-2020-12100/0010-lib-mail-message-parser-Optimize-boundary-lookups-wh.patch
CVE-2020-12100/0011-lib-mail-message-parser-Add-boundary_remove_until-he.patch
CVE-2020-12100/0012-lib-mail-message-parser-Don-t-use-memory-pool-for-pa.patch
CVE-2020-12100/0013-lib-mail-global-message_parser_init-Convert-flags-to.patch
CVE-2020-12100/0014-lib-mail-message-parser-Support-limiting-max-number-.patch
CVE-2020-12100/0015-lib-mail-message-parser-Support-limiting-max-number-.patch
CVE-2020-12100/0016-lib-mail-Fix-handling-trailing-in-MIME-boundaries.patch
CVE-2020-12673.patch
CVE-2020-12674/0001-auth-mech-rpa-Fail-on-zero-len-buffer.patch
bug928492.patch
CVE-2020-24386/0001-imap-Escape-tag-when-sending-it-to-imap-hibernate-pr.patch
CVE-2020-24386/0002-imap-Add-unit-test-for-imap-client-hibernate.patch
CVE-2020-25275/0001-lib-mail-message-parser-Fix-assert-crash-when-enforc.patch
CVE-2020-25275/0002-lib-imap-Don-t-generate-invalid-BODYSTRUCTURE-when-r.patch
bug970386.patch
debian-changes
CVE-2022-30550/auth-Add-a-comment-about-updating-userdb_find.patch
CVE-2022-30550/auth-Fix-handling-passdbs-with-identical-driver-args-but-.patch
CVE-2021-33515.patch
