Release Notes: A high load of DSN success notification requests could slow down the queue manager, which is now worked around by making the trace client asynchronous, just like the bounce and defer clients. The local delivery agent ignored table lookup errors in mailbox_command_maps, mailbox_transport_maps, fallback_transport_maps, and alias owner lookup, which is now fixed. Both RHSBL and RHSWL queries for names ending in a numerical suffix are now skipped. The Postfix Milter client reported a temporary error instead of "file too large" in three cases. Linux kernel version 3 support has been added.
Release Notes: A high load of DSN success notification requests could slow down the queue manager, which is now worked around by making the trace client asynchronous, just like the bounce and defer clients. The local delivery agent ignored table lookup errors in mailbox_command_maps, mailbox_transport_maps, fallback_transport_maps, and alias owner lookup, which is now fixed. Both RHSBL and RHSWL queries for names ending in a numerical suffix are now skipped. The Postfix Milter client reported a temporary error instead of "file too large" in three cases. Linux kernel version 3 support has been added.
Release Notes: A high load of DSN success notification requests could slow down the queue manager, which is now worked around by making the trace client asynchronous, just like the bounce and defer clients. The local delivery agent ignored table lookup errors in mailbox_command_maps, mailbox_transport_maps, fallback_transport_maps, and alias owner lookup, which is now fixed. Both RHSBL and RHSWL queries for names ending in a numerical suffix are now skipped. The Postfix Milter client reported a temporary error instead of "file too large" in three cases. Linux kernel version 3 support has been added.
Release Notes: The trace client was made asynchronous, since a high load of DSN success notification requests could slow down the queue manager. The local(8) delivery agent ignored certain table lookup errors. dbl.spamhaus.org rejects lookups with "No IP queries" even if the name has an alphanumerical prefix, so these lookups are now skipped. The "sendmail -t" command reported "protocol error" instead of "file too large", "no space left on device", etc. The Postfix Milter client reported a temporary error instead of "file too large" in three cases. Also, Linux kernel version 3 support has been added.
Release Notes: This version contains a fix for CVE-2011-1720, which affects Postfix SMTP server configurations that use Cyrus SASL authentication. This defect was introduced with the Postfix SASL patch, and is present in all Postfix versions where the command "postconf mail_release_date" reports a value of 20000314 (March 14, 2000) or greater. Note that CVE-2011-1720 does not affect Postfix SMTP servers that use Dovecot SASL authentication. It also does not affect the common Postfix SMTP server configurations that use only Cyrus SASL mechanisms PLAIN and LOGIN.
Release Notes: When a client disconnected and then reconnected before all DNSBL results for the earlier session arrived, DNSBL results for the earlier session would be added to the score for the later session. The SMTP client did not support mail to [ipv6:ipv6addr]. FreeBSD closefrom() was back-ported to FreeBSD 7, breaking FreeBSD 7.x support retroactively. The SUN compiler had trouble with a pointer expression of the form "("text1" "text2") + constant''.
Release Notes: This release contains a fix for CVE-2011-0411, which allows plain text command injection with SMTP sessions over TLS. This defect was introduced with Postfix version 2.2. The same flaw exists in other implementations of the STARTTLS command.
Release Notes: This release contains a fix for CVE-2011-0411, which allows plain text command injection with SMTP sessions over TLS. This defect was introduced with Postfix version 2.2. The same flaw exists in other implementations of the STARTTLS command.
Release Notes: This release contains a fix for CVE-2011-0411, which allows plain text command injection with SMTP sessions over TLS. This defect was introduced with Postfix version 2.2. The same flaw exists in other implementations of the STARTTLS command.
Release Notes: This release contains a fix for CVE-2011-0411, which allows plain text command injection with SMTP sessions over TLS. This defect was introduced with Postfix version 2.2. The same flaw exists in other implementations of the STARTTLS command.