Jump to: navigation, search

8.5.200.02

E-mail Server Release Notes

Release Date Release Type Restrictions AIX Linux Mac Solaris Windows
01/22/21 Update X X


Helpful Links

Releases Info


Product Documentation

Engage Email

Genesys Products

List of Release Notes

What's New

This release contains the following new features and enhancements:

  • E-mail Server now provides a new web-proxy configuration section to allow an external Web server configuration to access OAuth 2.0 authentication services via an HTTP request; for example, the Microsoft authentication service: https://login.microsoftonline.com. Previously, E-mail Server supported only the proxy section (SOCKS 5), which cannot be used for HTTP requests.
    With this release, the proxy section continues working for EWS/IMAP/POP3 and SMTP traffic, but it will not work for the HTTP requests for OAuth 2.0 authentication services. The web-proxy section must be configured in order to support the OAuth 2.0 authentication service. (ESR-15238)
  • E-mail Server now supports the UCS-X solution. See new configuration options in the ucs-x configuration section.
  • Support for the following operating systems. See the eServices page in the Genesys Supported Operating Environment Reference for more detailed information and a list of all supported operating systems.
    • Windows Server 2019
    • Red Hat Enterprise Linux 8
  • See also the Discontinued Support section for discontinued operating systems starting with this release.


Resolved Issues

This release contains the following resolved issues:


E-mail Server now correctly creates an interaction for an email message only if it is not already in the database according to a configuration value of the enable-message-id-check option. Previously, E-mail Server created new interactions for the email messages that were processed but it failed to mark them as "read", which resulted in duplicate copies of the same email received by an agent. (ESR-15215, ESR-15166)


E-mail Server now includes the 4.1.51.Final version of the Netty-all jar of PSDK that corrects the CVE-2020-11612 vulnerabilities. Previously, E-mail Server included the 4.1.33.Final version of Netty-all jar that had ZlibDecoders to allow unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder. (ESR-15120)




Upgrade Notes

No special procedure is required to upgrade to release 8.5.200.02.

This page was last edited on June 23, 2021, at 22:49.
Comments or questions about this documentation? Contact us for support!