Package: clamsmtp / 1.10-18.1
Metadata
| Package | Version | Patches format |
|---|---|---|
| clamsmtp | 1.10-18.1 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| 300175 fileperms.patch | (download) |
common/smtppass.c |
1 1 + 0 - 0 ! |
bug#300175: patch for clamav/clamsmtp
Date: Mon, 21 Mar 2005 11:07:48 +0100
To: 300175@bugs.debian.org
Cc: erwan@rail.eu.org
Reply-To: sam@rfc1149.net
On recent glibc, files created with mkstemp() are created with mode
0600. If the mode is not changed, there is no way for another user to
read the temporary file, regardless of the users' respective groups.
This patch allows users in the same group to read the temporary files.
This should solve Erwan's problem, and certainly has solved mine:
Sam
PS/ older glibc used to create the file in 0666 mode, which may explain
why not everyone has this problem
Samuel Tardieu -- sam@rfc1149.net -- http://www.rfc1149.net/sam
|
| gnu_source.patch | (download) |
common/smtppass.c |
2 0 + 2 - 0 ! |
--- |
| include_order.patch | (download) |
common/smtppass.c |
12 6 + 6 - 0 ! |
--- |
| leading_dots.patch | (download) |
common/smtppass.c |
74 52 + 22 - 0 ! |
--- |
| manpage.patch | (download) |
doc/clamsmtpd.8 |
2 1 + 1 - 0 ! |
--- |
| sock_any Use socklen_t for namelen in struct sockadd.patch | (download) |
common/sock_any.h |
2 1 + 1 - 0 ! |
[patch] sock_any: use socklen_t for `namelen' in struct sockaddr_any. The `namelen' argument is passed to various functions which expect `socklen_t' as type. This triggered already a warning in recent builds but with gcc-14 it has been upgraded to an error. The struct is only used internaly and it is safe to change it. Change sockaddr_any::namelen to `socklen_t'. BTS: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074883 Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc> |
| spio Don t write to non allocate memory.patch | (download) |
common/spio.c |
2 1 + 1 - 0 ! |
[patch] spio: don't write to non-allocate memory. spio::line has a size of SP_LINE_LENGTH items starting at 0 ending at SP_LINE_LENGTH - 1. Accessing item SP_LINE_LENGTH is out of bounds, it no longer part of spio::line. Use `SP_LINE_LENGTH - 1' as the last character. Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc> |
| smtppass Correct strncat invocation.patch | (download) |
common/smtppass.c |
5 4 + 1 - 0 ! |
[patch] smtppass: correct strncat() invocation. strncat() expects copies at most length_bytes + 1 therefore the buffer must be strlen(dest) + strlen(src) + 1 to cover everything. Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc> |
| gcc 15.patch | (download) |
common/smtppass.c |
4 2 + 2 - 0 ! |
fix ftbfs with gcc 15 |
