What's Changed
With the Moopril update, two security vulnerabilities in mailcow will be closed.
- CVE-2024-31204: XSS Vulnerability via Exception Handler
- CVE-2024-30270: Path Traversal and Arbitrary Code Execution Vulnerability
Thanks to Paul Gerste from Sonar for reporting the security vulnerabilities!
- chore(deps): update thollander/actions-comment-pull-request action to v2.5.0 by @renovate in #5747
- Translations update from Weblate by @milkmaker in #5762
- sogo: upgrade to 5.10.0 by @DerLinkman in #5765
- Translations update from Weblate by @milkmaker in #5777
- [Web]Small change about zh-cn translation by @aaadddfgh in #5789
- [Postfix] update postscreen_access.cidr by @milkmaker in #5770
- Remove one GmbH in Dockerfiles by @MAGICCC in #5743
- Translations update from Weblate by @milkmaker in #5810
- Update French translation by @yvan-algoo in #5805
- Translations update from Weblate by @milkmaker in #5813
- [Postfix] update postscreen_access.cidr by @milkmaker in #5811
- Translations update from Weblate by @milkmaker in #5815
- [Rspamd] Set local_addrs lo mailcow networks by @dragoangel in #5812
- [Rspamd] milter update Content-Type and Content-Transfer-Encoding header by @FreddleSpl0it in #5751
- [Web] fix exception handler and rspamd_maps function by @FreddleSpl0it in #5818
New Contributors
- @aaadddfgh made their first contribution in #5789
Full Changelog: 2024-02...2024-04