8.5.200.02
E-mail Server Release Notes
Release Date | Release Type | Restrictions | AIX | Linux | Mac | Solaris | Windows |
---|---|---|---|---|---|---|---|
01/22/21 | Update | X | X |
Helpful Links
Releases Info
Product Documentation
Genesys Products
What's New
This release contains the following new features and enhancements:
- E-mail Server now provides a new web-proxy configuration section to allow an external Web server configuration to access OAuth 2.0 authentication services via an HTTP request; for example, the Microsoft authentication service: https://login.microsoftonline.com. Previously, E-mail Server supported only the proxy section (SOCKS 5), which cannot be used for HTTP requests.
- With this release, the proxy section continues working for EWS/IMAP/POP3 and SMTP traffic, but it will not work for the HTTP requests for OAuth 2.0 authentication services. The web-proxy section must be configured in order to support the OAuth 2.0 authentication service. (ESR-15238)
- E-mail Server now supports the UCS-X solution. See new configuration options in the ucs-x configuration section.
- Support for the following operating systems. See the eServices page in the Genesys Supported Operating Environment Reference for more detailed information and a list of all supported operating systems.
- Windows Server 2019
- Red Hat Enterprise Linux 8
- See also the Discontinued Support section for discontinued operating systems starting with this release.
Resolved Issues
This release contains the following resolved issues:
E-mail Server now correctly creates an interaction for an email message only if it is not already in the database according to a configuration value of the enable-message-id-check option. Previously, E-mail Server created new interactions for the email messages that were processed but it failed to mark them as "read", which resulted in duplicate copies of the same email received by an agent. (ESR-15215, ESR-15166)
E-mail Server now includes the 4.1.51.Final version of the Netty-all jar of PSDK that corrects the CVE-2020-11612 vulnerabilities. Previously, E-mail Server included the 4.1.33.Final version of Netty-all jar that had ZlibDecoders to allow unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder. (ESR-15120)
Upgrade Notes
No special procedure is required to upgrade to release 8.5.200.02.