You've already forked Mailu
mirror of
https://github.com/Mailu/Mailu.git
synced 2025-09-16 09:06:32 +02:00
Merge branch 'Mailu:master' into patch-1
This commit is contained in:
@@ -27,7 +27,7 @@ CMD /bin/bash
|
||||
FROM system as build
|
||||
|
||||
ARG MAILU_DEPS=prod
|
||||
ARG SNUFFLEUPAGUS_VERSION=0.11.0
|
||||
ARG SNUFFLEUPAGUS_VERSION=0.12.0
|
||||
|
||||
ENV VIRTUAL_ENV=/app/venv
|
||||
|
||||
|
@@ -156,7 +156,7 @@ services:
|
||||
|
||||
{% if tika_enabled %}
|
||||
fts_attachments:
|
||||
image: apache/tika:2.9.2.1-full
|
||||
image: apache/tika:latest-full
|
||||
hostname: tika
|
||||
logging:
|
||||
driver: journald
|
||||
|
1
towncrier/newsfragments/3899.bugfix
Normal file
1
towncrier/newsfragments/3899.bugfix
Normal file
@@ -0,0 +1 @@
|
||||
Upgrade to Snuffleupagus 0.12 to fix a NULL ptr deref; re-enable the related rules
|
1
towncrier/newsfragments/3903.bugfix
Normal file
1
towncrier/newsfragments/3903.bugfix
Normal file
@@ -0,0 +1 @@
|
||||
Upgrade Tika to latest to fix CVE-2025-54988 (XXE). You will need to run setup again for the fix to be applied! This is defence in depth rather than something critical as on docker deployments there is no impact.
|
2
towncrier/newsfragments/3906.bugfix
Normal file
2
towncrier/newsfragments/3906.bugfix
Normal file
@@ -0,0 +1,2 @@
|
||||
Fix "passphrase changed" errors in snappymail. You may need to run:
|
||||
find webmail/_data_/_default_/storage/ -name .cryptkey -delete
|
@@ -6,6 +6,7 @@ attachment_size_limit = {{ MAX_FILESIZE }}
|
||||
[security]
|
||||
allow_admin_panel = Off
|
||||
openpgp = On
|
||||
insecure_cryptkey = On
|
||||
|
||||
[labs]
|
||||
allow_gravatar = Off
|
||||
|
@@ -144,11 +144,11 @@ sp.disable_function.function("ini_set").param("option").value_r("display_errors"
|
||||
|
||||
# Classic webshells patterns
|
||||
# Those create SIGSEGV on arm64 for some reason
|
||||
#sp.disable_function.function("system>base64_decode").drop();
|
||||
#sp.disable_function.function("shell_exec>base64_decode").drop();
|
||||
#sp.disable_function.function("exec>base64_decode").drop();
|
||||
#sp.disable_function.function("passthru>base64_decode").drop();
|
||||
#sp.disable_function.function("proc_open>base64_decode").drop();
|
||||
sp.disable_function.function("system>base64_decode").drop();
|
||||
sp.disable_function.function("shell_exec>base64_decode").drop();
|
||||
sp.disable_function.function("exec>base64_decode").drop();
|
||||
sp.disable_function.function("passthru>base64_decode").drop();
|
||||
sp.disable_function.function("proc_open>base64_decode").drop();
|
||||
sp.eval_blacklist.list("system,exec,shell_exec,passthru,proc_open");
|
||||
|
||||
sp.auto_cookie_secure.enable();
|
||||
@@ -156,6 +156,8 @@ sp.auto_cookie_secure.enable();
|
||||
# TODO: ensure this is up to date
|
||||
sp.cookie.name("roundcube_sessauth").samesite("strict");
|
||||
sp.cookie.name("roundcube_sessid").samesite("strict");
|
||||
sp.cookie.name("smtoken").samesite("strict");
|
||||
sp.cookie.name("smctoken").samesite("strict");
|
||||
sp.ini_protection.policy_silent_fail();
|
||||
|
||||
# roundcube uses unserialize() everywhere.
|
||||
|
Reference in New Issue
Block a user