Version 8.14.4 of Sendmail

Release Notes: This version fixed a problem where some certificate authorities do not properly check the requests they are signing and hence allow spoofing via an embedded NUL in the CN entry. A workaround for a Linux resolver problem has been added to avoid core dumps. A bug where the value of headers, e.g., Precedence, Content-Type, et.al., was not extracted correctly thus preventing them from being recognized properly was fixed. An erroneous reduction of the length limitation on a return path was fixed.

    Other releases

    •  28 Jan 2014 11:37

      Release Notes: This version fixes some problems, mostly related to IPv6. Unfortunately the Build script of 8.14.8 contains a regression, causing it to work improperly on some operating systems. A patch is available.

      •  22 Apr 2013 23:52

        Release Notes: This version fixes the handling of NUL characters ('\0') in mail bodies by the MIME conversion functions, which are used even if no explicit conversion is happening, e.g., if MaxMimeHeaderLength is not zero, as well as some other problems.

        •  22 Jan 2013 09:05

          Release Notes: This release fixed a problem where if a server offered two AUTH lines, the MTA would not read them after STARTTLS has been used and hence SMTP AUTH for the client side would fail. Hostnames are no longer cached internally in a non-case sensitive way, as that may cause addresses to change from lower case to upper case or vice versa. An issue where it was possible that new queue runners could not be started if MaxQueueChildren was set was fixed. A 8.14.6.milter.EHLOmacros patch is also available.

          •  30 May 2011 21:14

            Release Notes: SMTP extensions are no longer cached across connections, as the cache is based on hostname, which may not be a unique identifier for a server, i.e. different machines may have the same hostname but provide different SMTP extensions. Out-of-bounds access is avoided in case a resolver reply for a DNS map lookup returns a size larger than 1K. The interrupt signal handler has been cleaned up to avoid invoking functions that are not signal-safe. At most, two AUTH lines are read from a server to avoid a memory exhaustion DoS attack against the client.

            •  09 Jan 2010 08:08

              Release Notes: This version fixed a problem where some certificate authorities do not properly check the requests they are signing and hence allow spoofing via an embedded NUL in the CN entry. A workaround for a Linux resolver problem has been added to avoid core dumps. A bug where the value of headers, e.g., Precedence, Content-Type, et.al., was not extracted correctly thus preventing them from being recognized properly was fixed. An erroneous reduction of the length limitation on a return path was fixed.

              Screenshot

              Project Spotlight

              TMSU

              An application for tagging your files and navigating them as a virtual filesystem.

              Screenshot

              Project Spotlight

              Qmmp

              A Qt-based multimedia player.