]> git.ipfire.org Git - thirdparty/postfix.git/commitdiff
postfix-3.5.17 v3.5.17
authorWietse Venema <wietse@porcupine.org>
Fri, 7 Oct 2022 05:00:00 +0000 (00:00 -0500)
committerViktor Dukhovni <postfix-users@dukhovni.org>
Sun, 9 Oct 2022 01:40:59 +0000 (21:40 -0400)
postfix/HISTORY
postfix/src/cleanup/cleanup_milter.c
postfix/src/global/mail_version.h
postfix/src/global/map_search.c
postfix/src/global/verify.c
postfix/src/tls/tls_server.c

index 00a6cea5fd36aed316489bcf134eac8edf15b33e..665eebcc5e5ead368b6384f8fbf4f5110dce0bb1 100644 (file)
@@ -25131,3 +25131,28 @@ Apologies for any names omitted.
        chroot jail. Problem reported by Jesper Dybdal. Files:
        cleanup/cleanup.h, cleanup/cleanup_init.c,
        cleanup/cleanup_milter.c, cleanup/cleanup_state.c.
+
+20220719
+
+       Cleanup: Postfix 3.5.0 introduced debug logging noise in
+       map_search_create(). Files: global/map_search.c.
+
+20220724
+
+       Workaround: in a TLS server disable Postfix's 1-element
+       internal session cache, to work around an OpenSSL 3.0
+       regression that broke TLS handshakes. It is rarely useful.
+       Report by Spil Oss, fix by Viktor Dukhovni. File:
+       tls/tls_server.c.
+
+20220905
+
+       Cleanup: Postfix 3.3.0 introduced an uninitialized
+       verify_append() request status in case of a null original
+       recipient address.  File: global/verify.c.
+
+20220906
+
+       Cleanup: Postfix 3.5.16 introduced a missing msg_panic()
+       argument (in code that never executes). File:
+       cleanup/cleanup_milter.c.
index eb330a34d4984fa7fd2bf78aa2bd1ec7bba22bb4..b6a1ec42666431472f9b419cfab7d0348b2f5f3f 100644 (file)
@@ -530,7 +530,7 @@ void    cleanup_milter_header_checks_init(void)
        msg_panic("%s: %s is empty", myname, VAR_MILT_HEAD_CHECKS);
 
     if (cleanup_milter_hbc_checks)
-       msg_panic("%s: cleanup_milter_hbc_checks is not null");
+       msg_panic("%s: cleanup_milter_hbc_checks is not null", myname);
     cleanup_milter_hbc_checks =
        hbc_header_checks_create(VAR_MILT_HEAD_CHECKS, var_milt_head_checks,
                                 NO_MIME_HDR_NAME, NO_MIME_HDR_VALUE,
@@ -538,7 +538,7 @@ void    cleanup_milter_header_checks_init(void)
                                 &call_backs);
 
     if (cleanup_milter_hbc_reply)
-       msg_panic("%s: cleanup_milter_hbc_reply is not null");
+       msg_panic("%s: cleanup_milter_hbc_reply is not null", myname);
     cleanup_milter_hbc_reply = vstring_alloc(100);
 }
 
index 81a283f60e246404954b582eba2a1603787c64b6..7c5ebe66bfd83c5f02202504f7ba501d07913edd 100644 (file)
@@ -20,8 +20,8 @@
   * Patches change both the patchlevel and the release date. Snapshots have no
   * patchlevel; they change the release date only.
   */
-#define MAIL_RELEASE_DATE      "20220418"
-#define MAIL_VERSION_NUMBER    "3.5.16"
+#define MAIL_RELEASE_DATE      "20221007"
+#define MAIL_VERSION_NUMBER    "3.5.17"
 
 #ifdef SNAPSHOT
 #define MAIL_VERSION_DATE      "-" MAIL_RELEASE_DATE
index 8ba6a5a9849bc14dd2efbf8e8b09bd4fc7f6ae51..be4b42b33e9a3c70bc7c49efc19ff570335b3968 100644 (file)
@@ -188,7 +188,6 @@ const MAP_SEARCH *map_search_create(const char *map_spec)
                    MAP_SEARCH_CREATE_RETURN(0);
                }
            }
-           msg_info("split_nameval(\"%s\"", attr_name_val);
            if ((const_err = split_nameval(attr_name_val, &attr_name,
                                           &attr_value)) != 0) {
                msg_warn("malformed map attribute in '%s': '%s'",
index c4b26be04ff7d5b252c9a84d838afa9ce0df57af..91dd541b84582398ad3d91e07c7f114a2dafb1b1 100644 (file)
@@ -108,6 +108,8 @@ int     verify_append(const char *queue_id, MSG_STATS *stats,
        if (recipient->orig_addr[0])
            req_stat = verify_clnt_update(recipient->orig_addr, vrfy_stat,
                                          my_dsn.reason);
+       else
+           req_stat = VRFY_STAT_OK;
        /* Two verify updates for one verify request! */
        if (req_stat == VRFY_STAT_OK
            && strcmp(recipient->address, recipient->orig_addr) != 0)
index 25d85ec7bcf9682c74088a2a0294743fa428df25..a9b250921e0cb614af9e1f9410c35ac5f2cfaad0 100644 (file)
@@ -730,6 +730,7 @@ TLS_APPL_STATE *tls_server_init(const TLS_SERVER_INIT_PROPS *props)
                                       sizeof(server_session_id_context));
        SSL_CTX_set_session_cache_mode(server_ctx,
                                       SSL_SESS_CACHE_SERVER |
+                                      SSL_SESS_CACHE_NO_INTERNAL |
                                       SSL_SESS_CACHE_NO_AUTO_CLEAR);
        if (cachable) {
            app_ctx->cache_type = mystrdup(props->cache_type);