A new opensmtpd portable snapshot is available at:
http://www.opensmtpd.org/archives/opensmtpd-201410152136p1.tar.gz
Checksum:
SHA256 (opensmtpd-201410152136p1.tar.gz) =
4d468b339cced19fddd9087e4d0076548c1ff1f451f46f708a6c923b20631063
A summary of the content of this snapshot is available below.
Please test and let us know if it breaks something!
If this snapshot doesn't work, please also test with a previous one,
to help us spot where the issue is coming from. You can access all
previous snapshots here:
http://www.opensmtpd.org/archives/
The OpenSMTPD team ;-)
Summary of changes since last snapshot (opensmtpd-201410131657p1):
-----------------------------------------------------------------
- failure in header parsing should always lead to MF_ERROR_MALFORMED
- fix memory leak in rfc822 parser
- add limit to the number of header lines we're willing to buffer
- allow empty headers [1]
- disallow SSLv3
[1] Author: Emmanuel Vadot
--
You received this mail because you are subscribed to [email protected]
To unsubscribe, send a mail to: [email protected]