packages: exim/exim-bug-1057.patch - build fix
arekm
arekm at pld-linux.org
Fri Oct 21 09:10:06 CEST 2011
Author: arekm Date: Fri Oct 21 07:10:06 2011 GMT
Module: packages Tag: HEAD
---- Log message:
- build fix
---- Files affected:
packages/exim:
exim-bug-1057.patch (1.1 -> 1.2)
---- Diffs:
================================================================
Index: packages/exim/exim-bug-1057.patch
diff -u packages/exim/exim-bug-1057.patch:1.1 packages/exim/exim-bug-1057.patch:1.2
--- packages/exim/exim-bug-1057.patch:1.1 Fri Oct 21 09:02:41 2011
+++ packages/exim/exim-bug-1057.patch Fri Oct 21 09:10:01 2011
@@ -1,14 +1,16 @@
diff -urN exim-4.73_RC1/src/malware.c exim-4.73_RC1-new/src/malware.c
--- exim-4.73_RC1/src/malware.c 2010-12-23 14:19:35.000000000 +0000
+++ exim-4.73_RC1-new/src/malware.c 2011-01-05 09:58:34.000000000 +0000
-@@ -12,6 +12,16 @@
+@@ -12,6 +12,18 @@
#include "exim.h"
#ifdef WITH_CONTENT_SCAN
+/* The maximum number of clamd servers that are supported in the configuration */
+#define MAX_CLAMD_SERVERS 32
++#define MAX_CLAMD_SERVERS_S "32"
+/* Maximum length of the hostname that can be specified in the clamd address list */
+#define MAX_CLAMD_ADDRESS_LENGTH 64
++#define MAX_CLAMD_ADDRESS_LENGTH_S "64"
+
+typedef struct clamd_address_container {
+ uschar tcp_addr[MAX_CLAMD_ADDRESS_LENGTH];
@@ -18,7 +20,7 @@
/* declaration of private routines */
static int mksd_scan_packed(int sock, uschar *scan_filename);
static int malware_internal(uschar **listptr, uschar *eml_filename, BOOL faking);
-@@ -1295,7 +1305,7 @@
+@@ -1295,7 +1307,7 @@
* WITH_OLD_CLAMAV_STREAM is defined.
* See Exim bug 926 for details. */
else if (strcmpic(scanner_name,US"clamd") == 0) {
@@ -27,7 +29,7 @@
uschar clamd_options_buffer[1024];
uschar clamd_options_default[] = "/tmp/clamd";
uschar *p, *vname, *result_tag, *response_end;
-@@ -1304,16 +1314,16 @@
+@@ -1304,16 +1316,16 @@
unsigned int port;
uschar file_name[1024];
uschar av_buffer[1024];
@@ -49,7 +51,7 @@
#ifdef WITH_OLD_CLAMAV_STREAM
uschar av_buffer2[1024];
int sockData;
-@@ -1327,16 +1337,60 @@
+@@ -1327,16 +1339,60 @@
/* no options supplied, use default options */
clamd_options = clamd_options_default;
}
@@ -89,7 +91,7 @@
+ (clamd_address_container *)store_get(sizeof(clamd_address_container));
+
+ /* extract host and port part */
-+ if( sscanf(CS address, "%" MAX_CLAMD_ADDRESS_LENGTH "s %u", this_clamd->tcp_addr,
++ if( sscanf(CS address, "%" MAX_CLAMD_ADDRESS_LENGTH_S "s %u", this_clamd->tcp_addr,
+ &(this_clamd->tcp_port)) != 2 ) {
+ log_write(0, LOG_MAIN|LOG_PANIC,
+ "malware acl condition: clamd: invalid address '%s'", address);
@@ -100,8 +102,8 @@
+ num_servers++;
+ if (num_servers >= MAX_CLAMD_SERVERS) {
+ log_write(0, LOG_MAIN|LOG_PANIC,
-+ "More than " MAX_CLAMD_SERVERS " clamd servers specified; "
-+ "only using the first " MAX_CLAMD_SERVERS );
++ "More than " MAX_CLAMD_SERVERS_S " clamd servers specified; "
++ "only using the first " MAX_CLAMD_SERVERS_S );
+ break;
+ }
+ } while ((address = string_nextinlist(&av_scanner_work, &sep,
@@ -118,7 +120,7 @@
/* See the discussion of response formats below to see why we really don't
like colons in filenames when passing filenames to ClamAV. */
-@@ -1347,45 +1401,72 @@
+@@ -1347,45 +1403,72 @@
return DEFER;
}
================================================================
---- CVS-web:
http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/packages/exim/exim-bug-1057.patch?r1=1.1&r2=1.2&f=u
More information about the pld-cvs-commit
mailing list