[An on-line version of this announcement will be available at
http://www.postfix.org/announcements/postfix-2.9.6.html]

Postfix stable release 2.9.6, and legacy releases 2.8.14, 2.7.13,
2.6.19 are available. They contain fixes and workarounds that are
also part of Postfix 2.10.

Postfix 2.9:

  * Thanks to OpenSSL documentation, the Postfix 2.9.0..2.9.5 SMTP
    client and server used an incorrect procedure to compute TLS
    certificate PUBLIC-KEY fingerprints (these may be used in the
    check_ccert_access and in smtp_tls_policy_maps features). Support
    for certificate PUBLIC-KEY finger prints was introduced with
    Postfix 2.9; there is no known problem with the certificate
    fingerprint algorithms available since Postfix 2.2.

    Specify "tls_legacy_public_key_fingerprints = yes" temporarily,
    pending a migration from configuration files with incorrect
    Postfix 2.9.0..2.9.5 certificate PUBLIC-KEY finger prints, to
    the correct fingerprints used by Postfix 2.9.6 and later.

    See the RELEASE_NOTES file for more details.

All supported releases:

  * The postconf(1) master.cf options parser didn't support "clusters"
    of daemon command-line option letters.

  * The local(8) delivery agent dereferenced a null pointer while
    delivering to null command (for example, "|" in a .forward
    file). Reported by Gilles Chehade.

  * A memory leak fix for tls_misc.c was documented but not included.

You can find the updated Postfix source code at the mirrors listed
at http://www.postfix.org/.

        Wietse

Reply via email to