Comment 10 for bug 869411

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package postfix - 2.8.5-2~build0.11.04

---------------
postfix (2.8.5-2~build0.11.04) natty-proposed; urgency=low

  [ LaMont Jones ]
  * Trial microversion update per TB 10/6/11 (LP: #869411)

  [Wietse Venema]

  * 2.8.5
    - Workaround: report a {client_connections} Milter macro value of zero
      instead of garbage, when the remote SMTP client is not subject to any
      smtpd_client_* limits. Problem reported by Christian Roessner.
    - Bugfix: allow for Milters that send an SMTP server reply without RFC 3463
      enhanced status code. Reported by Vladimir Vassiliev.
  * 2.8.4
    - Performance: a high load of DSN success notification requests
      could slow down the queue manager.
    - Bugfix (introduced Postfix 2.3 and Postfix 2.7): the Milter
      client reported some "file too large" errors as temporary
      errors.
    - Bugfix (introduced in Postfix 1.1, duplicated in Postfix
      2.3, unrelated mistake in Postfix 2.7): the local(8) delivery
      agent ignored table lookup errors in mailbox_command_maps,
      mailbox_transport_maps, fallback_transport_maps and (while
      bouncing mail to alias) alias owner lookup.
    - Bugfix (introduced Postfix 2.6 with master_service_disable)
      loop control error when parsing a malformed master.cf file.
    - Bugfix (introduced: Postfix 2.7): "sendmail -t" reported
      "protocol error" after queue file write error.
    - Linux kernel version 3 support.
    - Workaround: some Spamhaus RHSBL rejects lookups with "No
      IP queries" even if the name has an alphanumerical prefix.
      We play safe, and skip both RHSBL and RHSWL queries for
      names ending in a numerical suffix.
  * 2.8.3
    - Cleanup: postscreen(8) and verify(8) daemons now lock their respective
      cache file exclusively upon open, to avoid massive cache corruption
      by unsupported sharing.
    - Bugfix (introduced with Postfix SASL patch 20000314): don't reuse a
      server SASL handle after authentication failure. CVE-2011-1720
 -- Scott Kitterman <email address hidden> Fri, 07 Oct 2011 00:59:20 -0500