A new opensmtpd snapshot is available at:
http://www.opensmtpd.org/archives/opensmtpd-201410152134.tar.gz
Checksum:
SHA256 (opensmtpd-201410152134.tar.gz) =
33fd8a1360a542259c7593ba38474bb6c425bac3c05ac924b3bb060a086cf63b
A summary of the content of this snapshot is available below.
Please test and let us know if it breaks something!
If this snapshot doesn't work, please also test with a previous one,
to help us spot where the issue is coming from. You can access all
previous snapshots here:
http://www.opensmtpd.org/archives/
The OpenSMTPD team ;-)
Summary of changes since last snapshot (opensmtpd-201410131651):
---------------------------------------------------------------
- failure in header parsing should always lead to MF_ERROR_MALFORMED
- fix memory leak in rfc822 parser
- add limit to the number of header lines we're willing to buffer
- allow empty headers
- disallow SSLv3
--
You received this mail because you are subscribed to [email protected]
To unsubscribe, send a mail to: [email protected]