http://issues.apache.org/SpamAssassin/show_bug.cgi?id=5034
[EMAIL PROTECTED] changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #3660 is|0 |1
obsolete| |
------- Additional Comments From [EMAIL PROTECTED] 2006-08-23 20:56 -------
Created an attachment (id=3669)
--> (http://issues.apache.org/SpamAssassin/attachment.cgi?id=3669&action=view)
amendment to 3660
patch 3660 was definitely on the right track -- however, there's still a
related issue. Currently, if invalid input is encountered, those loops will
immediately exit via "last", since this condition is evaluated:
elsif ($line =~ /$EOL/) {
last;
}
all lines will contain a $EOL, at end-of-line, so that'll always be true unless
one of the existing headers was encountered first. The result would be that
the $data{message} would contain any further unhandled headers, as well as the
message text. The correct way to do it is to look for /^${EOL}$/:
elsif ($line =~ /^${EOL}$/) {
last;
}
this updated patch does that...
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.