2
0
mirror of https://github.com/vdukhovni/postfix synced 2025-08-31 06:05:37 +00:00

postfix-3.5-20190310

This commit is contained in:
Wietse Venema
2019-03-10 00:00:00 -05:00
committed by Viktor Dukhovni
parent 6866cb3b71
commit e1e96a02c3
7 changed files with 23 additions and 9 deletions

View File

@@ -24179,3 +24179,20 @@ Apologies for any names omitted.
the same filename for a private key and certificate. Reported
by Mike Kazantsev. Fix by Viktor Dukhovni. Wietse fixed the
test. Files: tls/tls_certkey.c, tls/Makefile.in.
20190310
Bitrot: LINUX5s support, after some sanity checks with a
rawhide prerelease version. Files: makedefs, util/sys_defs.h.
Bugfix (introduced: 20181226): broken DANE trust anchor
file support, caused by left-over debris from the 20181226
TLS library overhaul. Scott Kitterman. File: tls/tls_dane.c.
Bugfix (introduced: Postfix-1.0.1): null pointer read, while
logging a warning after a corrupted bounce log file. File:
global/bounce_log.c.
Bugfix (introduced: Postfix-2.9.0): null pointer read, while
logging a warning after a postscreen_command_filter read
error. File: postscreen/postscreen_smtpd.c. global/bounce_log.c

View File

@@ -557,7 +557,7 @@ EOF
: ${SHLIB_ENV="LD_LIBRARY_PATH=`pwd`/lib"}
: ${PLUGIN_LD="${CC-gcc} -shared"}
;;
Linux.[34].*) SYSTYPE=LINUX$RELEASE_MAJOR
Linux.[345].*) SYSTYPE=LINUX$RELEASE_MAJOR
case "$CCARGS" in
*-DNO_DB*) ;;
*-DHAS_DB*) ;;

View File

@@ -264,7 +264,7 @@ BOUNCE_LOG *bounce_log_read(BOUNCE_LOG *bp, RCPT_BUF *rcpt_buf,
recipient = cp + 1;
if ((cp = strstr(recipient, ">: ")) == 0) {
msg_warn("%s: malformed record: %.30s...",
VSTREAM_PATH(bp->fp), cp);
VSTREAM_PATH(bp->fp), recipient - 1);
continue;
}
*cp = 0;

View File

@@ -20,7 +20,7 @@
* Patches change both the patchlevel and the release date. Snapshots have no
* patchlevel; they change the release date only.
*/
#define MAIL_RELEASE_DATE "20190307"
#define MAIL_RELEASE_DATE "20190310"
#define MAIL_VERSION_NUMBER "3.5"
#ifdef SNAPSHOT

View File

@@ -939,7 +939,8 @@ static void psc_smtpd_read_event(int event, void *context)
vstring_strcpy(state->cmd_buffer, cp);
} else if (psc_cmd_filter->error != 0) {
msg_fatal("%s:%s lookup error for \"%.100s\"",
psc_cmd_filter->type, psc_cmd_filter->name, cp);
psc_cmd_filter->type, psc_cmd_filter->name,
STR(state->cmd_buffer));
}
}

View File

@@ -1125,7 +1125,6 @@ TLS_DANE *tls_dane_resolve(unsigned port, const char *proto, DNS_RR *hostrr,
int tls_dane_load_trustfile(TLS_DANE *dane, const char *tafile)
{
#ifdef TRUST_ANCHOR_SUPPORT
BIO *bp;
char *name = 0;
char *header = 0;
@@ -1217,9 +1216,6 @@ int tls_dane_load_trustfile(TLS_DANE *dane, const char *tafile)
}
/* Some other PEM read error */
tls_print_errors();
#else
msg_warn("Trust anchor files not supported");
#endif
return (0);
}

View File

@@ -749,7 +749,7 @@ extern int initgroups(const char *, int);
/*
* LINUX.
*/
#if defined(LINUX2) || defined(LINUX3) || defined(LINUX4)
#if defined(LINUX2) || defined(LINUX3) || defined(LINUX4) || defined(LINUX5)
#define SUPPORTED
#define UINT32_TYPE unsigned int
#define UINT16_TYPE unsigned short