Prereq: "3.4.1" diff -ur --new-file /var/tmp/postfix-3.4.1/src/global/mail_version.h ./src/global/mail_version.h --- /var/tmp/postfix-3.4.1/src/global/mail_version.h 2019-03-07 19:08:42.000000000 -0500 +++ ./src/global/mail_version.h 2019-03-10 17:27:36.000000000 -0400 @@ -20,8 +20,8 @@ * Patches change both the patchlevel and the release date. Snapshots have no * patchlevel; they change the release date only. */ -#define MAIL_RELEASE_DATE "20190307" -#define MAIL_VERSION_NUMBER "3.4.1" +#define MAIL_RELEASE_DATE "20190310" +#define MAIL_VERSION_NUMBER "3.4.2" #ifdef SNAPSHOT #define MAIL_VERSION_DATE "-" MAIL_RELEASE_DATE diff -ur --new-file /var/tmp/postfix-3.4.1/HISTORY ./HISTORY --- /var/tmp/postfix-3.4.1/HISTORY 2019-03-07 19:08:17.000000000 -0500 +++ ./HISTORY 2019-03-10 17:28:19.000000000 -0400 @@ -24169,3 +24169,20 @@ the same filename for a private key and certificate. Reported by Mike Kazantsev. Fix by Viktor Dukhovni. Wietse fixed the test. Files: tls/tls_certkey.c, tls/Makefile.in. + +20190310 + + Bitrot: LINUX5s support, after some sanity checks with a + rawhide prerelease version. Files: makedefs, util/sys_defs.h. + + Bugfix (introduced: 20181226): broken DANE trust anchor + file support, caused by left-over debris from the 20181226 + TLS library overhaul. Scott Kitterman. File: tls/tls_dane.c. + + Bugfix (introduced: Postfix-1.0.1): null pointer read, while + logging a warning after a corrupted bounce log file. File: + global/bounce_log.c. + + Bugfix (introduced: Postfix-2.9.0): null pointer read, while + logging a warning after a postscreen_command_filter read + error. File: postscreen/postscreen_smtpd.c. global/bounce_log.c diff -ur --new-file /var/tmp/postfix-3.4.1/src/global/bounce_log.c ./src/global/bounce_log.c --- /var/tmp/postfix-3.4.1/src/global/bounce_log.c 2014-12-06 20:35:33.000000000 -0500 +++ ./src/global/bounce_log.c 2019-03-10 17:08:20.000000000 -0400 @@ -264,7 +264,7 @@ recipient = cp + 1; if ((cp = strstr(recipient, ">: ")) == 0) { msg_warn("%s: malformed record: %.30s...", - VSTREAM_PATH(bp->fp), cp); + VSTREAM_PATH(bp->fp), recipient - 1); continue; } *cp = 0; diff -ur --new-file /var/tmp/postfix-3.4.1/src/postscreen/postscreen_smtpd.c ./src/postscreen/postscreen_smtpd.c --- /var/tmp/postfix-3.4.1/src/postscreen/postscreen_smtpd.c 2018-09-03 18:49:28.000000000 -0400 +++ ./src/postscreen/postscreen_smtpd.c 2019-03-10 15:41:51.000000000 -0400 @@ -939,7 +939,8 @@ vstring_strcpy(state->cmd_buffer, cp); } else if (psc_cmd_filter->error != 0) { msg_fatal("%s:%s lookup error for \"%.100s\"", - psc_cmd_filter->type, psc_cmd_filter->name, cp); + psc_cmd_filter->type, psc_cmd_filter->name, + STR(state->cmd_buffer)); } } diff -ur --new-file /var/tmp/postfix-3.4.1/src/tls/tls_dane.c ./src/tls/tls_dane.c --- /var/tmp/postfix-3.4.1/src/tls/tls_dane.c 2019-02-09 20:22:14.000000000 -0500 +++ ./src/tls/tls_dane.c 2019-03-10 15:26:20.000000000 -0400 @@ -1125,7 +1125,6 @@ int tls_dane_load_trustfile(TLS_DANE *dane, const char *tafile) { -#ifdef TRUST_ANCHOR_SUPPORT BIO *bp; char *name = 0; char *header = 0; @@ -1217,9 +1216,6 @@ } /* Some other PEM read error */ tls_print_errors(); -#else - msg_warn("Trust anchor files not supported"); -#endif return (0); } diff -ur --new-file /var/tmp/postfix-3.4.1/src/util/sys_defs.h ./src/util/sys_defs.h --- /var/tmp/postfix-3.4.1/src/util/sys_defs.h 2018-03-04 14:01:27.000000000 -0500 +++ ./src/util/sys_defs.h 2019-03-10 12:58:04.000000000 -0400 @@ -749,7 +749,7 @@ /* * LINUX. */ -#if defined(LINUX2) || defined(LINUX3) || defined(LINUX4) +#if defined(LINUX2) || defined(LINUX3) || defined(LINUX4) || defined(LINUX5) #define SUPPORTED #define UINT32_TYPE unsigned int #define UINT16_TYPE unsigned short