2
0
mirror of https://github.com/vdukhovni/postfix synced 2025-08-29 13:18:12 +00:00

postfix-3.5.17

This commit is contained in:
Wietse Venema 2022-10-07 00:00:00 -05:00 committed by Viktor Dukhovni
parent 7416f222ae
commit 265b67ac9e
6 changed files with 32 additions and 5 deletions

View File

@ -25131,3 +25131,28 @@ Apologies for any names omitted.
chroot jail. Problem reported by Jesper Dybdal. Files: chroot jail. Problem reported by Jesper Dybdal. Files:
cleanup/cleanup.h, cleanup/cleanup_init.c, cleanup/cleanup.h, cleanup/cleanup_init.c,
cleanup/cleanup_milter.c, cleanup/cleanup_state.c. cleanup/cleanup_milter.c, cleanup/cleanup_state.c.
20220719
Cleanup: Postfix 3.5.0 introduced debug logging noise in
map_search_create(). Files: global/map_search.c.
20220724
Workaround: in a TLS server disable Postfix's 1-element
internal session cache, to work around an OpenSSL 3.0
regression that broke TLS handshakes. It is rarely useful.
Report by Spil Oss, fix by Viktor Dukhovni. File:
tls/tls_server.c.
20220905
Cleanup: Postfix 3.3.0 introduced an uninitialized
verify_append() request status in case of a null original
recipient address. File: global/verify.c.
20220906
Cleanup: Postfix 3.5.16 introduced a missing msg_panic()
argument (in code that never executes). File:
cleanup/cleanup_milter.c.

View File

@ -530,7 +530,7 @@ void cleanup_milter_header_checks_init(void)
msg_panic("%s: %s is empty", myname, VAR_MILT_HEAD_CHECKS); msg_panic("%s: %s is empty", myname, VAR_MILT_HEAD_CHECKS);
if (cleanup_milter_hbc_checks) if (cleanup_milter_hbc_checks)
msg_panic("%s: cleanup_milter_hbc_checks is not null"); msg_panic("%s: cleanup_milter_hbc_checks is not null", myname);
cleanup_milter_hbc_checks = cleanup_milter_hbc_checks =
hbc_header_checks_create(VAR_MILT_HEAD_CHECKS, var_milt_head_checks, hbc_header_checks_create(VAR_MILT_HEAD_CHECKS, var_milt_head_checks,
NO_MIME_HDR_NAME, NO_MIME_HDR_VALUE, NO_MIME_HDR_NAME, NO_MIME_HDR_VALUE,
@ -538,7 +538,7 @@ void cleanup_milter_header_checks_init(void)
&call_backs); &call_backs);
if (cleanup_milter_hbc_reply) if (cleanup_milter_hbc_reply)
msg_panic("%s: cleanup_milter_hbc_reply is not null"); msg_panic("%s: cleanup_milter_hbc_reply is not null", myname);
cleanup_milter_hbc_reply = vstring_alloc(100); cleanup_milter_hbc_reply = vstring_alloc(100);
} }

View File

@ -20,8 +20,8 @@
* Patches change both the patchlevel and the release date. Snapshots have no * Patches change both the patchlevel and the release date. Snapshots have no
* patchlevel; they change the release date only. * patchlevel; they change the release date only.
*/ */
#define MAIL_RELEASE_DATE "20220418" #define MAIL_RELEASE_DATE "20221007"
#define MAIL_VERSION_NUMBER "3.5.16" #define MAIL_VERSION_NUMBER "3.5.17"
#ifdef SNAPSHOT #ifdef SNAPSHOT
#define MAIL_VERSION_DATE "-" MAIL_RELEASE_DATE #define MAIL_VERSION_DATE "-" MAIL_RELEASE_DATE

View File

@ -188,7 +188,6 @@ const MAP_SEARCH *map_search_create(const char *map_spec)
MAP_SEARCH_CREATE_RETURN(0); MAP_SEARCH_CREATE_RETURN(0);
} }
} }
msg_info("split_nameval(\"%s\"", attr_name_val);
if ((const_err = split_nameval(attr_name_val, &attr_name, if ((const_err = split_nameval(attr_name_val, &attr_name,
&attr_value)) != 0) { &attr_value)) != 0) {
msg_warn("malformed map attribute in '%s': '%s'", msg_warn("malformed map attribute in '%s': '%s'",

View File

@ -108,6 +108,8 @@ int verify_append(const char *queue_id, MSG_STATS *stats,
if (recipient->orig_addr[0]) if (recipient->orig_addr[0])
req_stat = verify_clnt_update(recipient->orig_addr, vrfy_stat, req_stat = verify_clnt_update(recipient->orig_addr, vrfy_stat,
my_dsn.reason); my_dsn.reason);
else
req_stat = VRFY_STAT_OK;
/* Two verify updates for one verify request! */ /* Two verify updates for one verify request! */
if (req_stat == VRFY_STAT_OK if (req_stat == VRFY_STAT_OK
&& strcmp(recipient->address, recipient->orig_addr) != 0) && strcmp(recipient->address, recipient->orig_addr) != 0)

View File

@ -730,6 +730,7 @@ TLS_APPL_STATE *tls_server_init(const TLS_SERVER_INIT_PROPS *props)
sizeof(server_session_id_context)); sizeof(server_session_id_context));
SSL_CTX_set_session_cache_mode(server_ctx, SSL_CTX_set_session_cache_mode(server_ctx,
SSL_SESS_CACHE_SERVER | SSL_SESS_CACHE_SERVER |
SSL_SESS_CACHE_NO_INTERNAL |
SSL_SESS_CACHE_NO_AUTO_CLEAR); SSL_SESS_CACHE_NO_AUTO_CLEAR);
if (cachable) { if (cachable) {
app_ctx->cache_type = mystrdup(props->cache_type); app_ctx->cache_type = mystrdup(props->cache_type);