A new opensmtpd portable snapshot is available at:

        http://www.opensmtpd.org/archives/opensmtpd-201410152136p1.tar.gz

Checksum:

  SHA256 (opensmtpd-201410152136p1.tar.gz) =
  4d468b339cced19fddd9087e4d0076548c1ff1f451f46f708a6c923b20631063

A summary of the content of this snapshot is available below.

Please test and let us know if it breaks something!

If this snapshot doesn't work, please also test with a previous one,
to help us spot where the issue is coming from. You can access all
previous snapshots here:

        http://www.opensmtpd.org/archives/

The OpenSMTPD team ;-)


Summary of changes since last snapshot (opensmtpd-201410131657p1):
-----------------------------------------------------------------

    - failure in header parsing should always lead to MF_ERROR_MALFORMED
    - fix memory leak in rfc822 parser
    - add limit to the number of header lines we're willing to buffer
    - allow empty headers [1]
    - disallow SSLv3

[1] Author: Emmanuel Vadot

-- 
You received this mail because you are subscribed to misc@opensmtpd.org
To unsubscribe, send a mail to: misc+unsubscr...@opensmtpd.org

Reply via email to