[An on-line version of this announcement will be available at
http://www.postfix.org/announcements/postfix-2.9.6.html]
Postfix stable release 2.9.6, and legacy releases 2.8.14, 2.7.13,
2.6.19 are available. They contain fixes and workarounds that are
also part of Postfix 2.10.
Postfix 2.9:
* Thanks to OpenSSL documentation, the Postfix 2.9.0..2.9.5 SMTP
client and server used an incorrect procedure to compute TLS
certificate PUBLIC-KEY fingerprints (these may be used in the
check_ccert_access and in smtp_tls_policy_maps features). Support
for certificate PUBLIC-KEY finger prints was introduced with
Postfix 2.9; there is no known problem with the certificate
fingerprint algorithms available since Postfix 2.2.
Specify "tls_legacy_public_key_fingerprints = yes" temporarily,
pending a migration from configuration files with incorrect
Postfix 2.9.0..2.9.5 certificate PUBLIC-KEY finger prints, to
the correct fingerprints used by Postfix 2.9.6 and later.
See the RELEASE_NOTES file for more details.
All supported releases:
* The postconf(1) master.cf options parser didn't support "clusters"
of daemon command-line option letters.
* The local(8) delivery agent dereferenced a null pointer while
delivering to null command (for example, "|" in a .forward
file). Reported by Gilles Chehade.
* A memory leak fix for tls_misc.c was documented but not included.
You can find the updated Postfix source code at the mirrors listed
at http://www.postfix.org/.
Wietse