]> git.ipfire.org Git - thirdparty/postfix.git/commitdiff
postfix-3.6.7 v3.6.7
authorWietse Venema <wietse@porcupine.org>
Fri, 7 Oct 2022 05:00:00 +0000 (00:00 -0500)
committerViktor Dukhovni <postfix-users@dukhovni.org>
Sun, 9 Oct 2022 01:42:48 +0000 (21:42 -0400)
postfix/HISTORY
postfix/src/cleanup/cleanup_milter.c
postfix/src/global/mail_version.h
postfix/src/global/map_search.c
postfix/src/global/verify.c
postfix/src/tls/tls_server.c

index faff92184352bae8e9b6aebfd8b77b37a6e8aac5..ca4ce24aed4bb36170b731da4b346835a6b6d71f 100644 (file)
@@ -25770,3 +25770,28 @@ Apologies for any names omitted.
        chroot jail. Problem reported by Jesper Dybdal. Files:
        cleanup/cleanup.h, cleanup/cleanup_init.c,
        cleanup/cleanup_milter.c, cleanup/cleanup_state.c.
+
+20220719
+
+       Cleanup: Postfix 3.5.0 introduced debug logging noise in
+       map_search_create(). Files: global/map_search.c.
+
+20220724
+
+       Workaround: in a TLS server disable Postfix's 1-element
+       internal session cache, to work around an OpenSSL 3.0
+       regression that broke TLS handshakes. It is rarely useful.
+       Report by Spil Oss, fix by Viktor Dukhovni. File:
+       tls/tls_server.c.
+
+20220905
+
+       Cleanup Postfix 3.3.0 introduced an uninitialized verify_append()
+       request status in case of a null original recipient address.
+       File: global/verify.c.
+
+20220906
+
+       Cleanup: Postfix 3.6.6 introduced a missing msg_panic()
+       argument (in code that never executes). File:
+       cleanup/cleanup_milter.c.
index 1882ed766544e58e1910b4ac5f53f85af0423e99..deadfdef5d20baf5ae34f98899e07e6daa602e0e 100644 (file)
@@ -530,7 +530,7 @@ void    cleanup_milter_header_checks_init(void)
        msg_panic("%s: %s is empty", myname, VAR_MILT_HEAD_CHECKS);
 
     if (cleanup_milter_hbc_checks)
-       msg_panic("%s: cleanup_milter_hbc_checks is not null");
+       msg_panic("%s: cleanup_milter_hbc_checks is not null", myname);
     cleanup_milter_hbc_checks =
        hbc_header_checks_create(VAR_MILT_HEAD_CHECKS, var_milt_head_checks,
                                 NO_MIME_HDR_NAME, NO_MIME_HDR_VALUE,
@@ -538,7 +538,7 @@ void    cleanup_milter_header_checks_init(void)
                                 &call_backs);
 
     if (cleanup_milter_hbc_reply)
-       msg_panic("%s: cleanup_milter_hbc_reply is not null");
+       msg_panic("%s: cleanup_milter_hbc_reply is not null", myname);
     cleanup_milter_hbc_reply = vstring_alloc(100);
 }
 
index 07c979ce5f26ec6cf0fa66f30398e1cb12e9183b..26147d56b94955fe08dc928d50f54f40fe4809c0 100644 (file)
@@ -20,8 +20,8 @@
   * Patches change both the patchlevel and the release date. Snapshots have no
   * patchlevel; they change the release date only.
   */
-#define MAIL_RELEASE_DATE      "20220418"
-#define MAIL_VERSION_NUMBER    "3.6.6"
+#define MAIL_RELEASE_DATE      "20221007"
+#define MAIL_VERSION_NUMBER    "3.6.7"
 
 #ifdef SNAPSHOT
 #define MAIL_VERSION_DATE      "-" MAIL_RELEASE_DATE
index 8ba6a5a9849bc14dd2efbf8e8b09bd4fc7f6ae51..be4b42b33e9a3c70bc7c49efc19ff570335b3968 100644 (file)
@@ -188,7 +188,6 @@ const MAP_SEARCH *map_search_create(const char *map_spec)
                    MAP_SEARCH_CREATE_RETURN(0);
                }
            }
-           msg_info("split_nameval(\"%s\"", attr_name_val);
            if ((const_err = split_nameval(attr_name_val, &attr_name,
                                           &attr_value)) != 0) {
                msg_warn("malformed map attribute in '%s': '%s'",
index c4b26be04ff7d5b252c9a84d838afa9ce0df57af..91dd541b84582398ad3d91e07c7f114a2dafb1b1 100644 (file)
@@ -108,6 +108,8 @@ int     verify_append(const char *queue_id, MSG_STATS *stats,
        if (recipient->orig_addr[0])
            req_stat = verify_clnt_update(recipient->orig_addr, vrfy_stat,
                                          my_dsn.reason);
+       else
+           req_stat = VRFY_STAT_OK;
        /* Two verify updates for one verify request! */
        if (req_stat == VRFY_STAT_OK
            && strcmp(recipient->address, recipient->orig_addr) != 0)
index 6162191d6d34e9690514d225e2ecb759e8dd0aa6..97ab89834aab9d70154eb296ce274f2bb438bb0a 100644 (file)
@@ -696,6 +696,7 @@ TLS_APPL_STATE *tls_server_init(const TLS_SERVER_INIT_PROPS *props)
                                       sizeof(server_session_id_context));
        SSL_CTX_set_session_cache_mode(server_ctx,
                                       SSL_SESS_CACHE_SERVER |
+                                      SSL_SESS_CACHE_NO_INTERNAL |
                                       SSL_SESS_CACHE_NO_AUTO_CLEAR);
        if (cachable) {
            app_ctx->cache_type = mystrdup(props->cache_type);