-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Magnus Holmgren wrote:
> Any comments or objections to these patches?
> http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;att=1;bug=430508

Thanks for your patch!

Robert Millan wrote in bugs.debian.org #430508:
> spfquery segfaults when passing it a -guess argument:
>
>   $ spfquery -ip 1.2.3.4 -sender [EMAIL PROTECTED] -helo foo -guess blah
>
> This is caused by spf_response_2mx being a null pointer in
> APPEND_RESULT(SPF_response_result(spf_response_2mx));
>
> I *think* that usage of this variable is all wrong in this routine,
> since we're checking for fallback spf record not 2nd rcpt mx.  See
> attached patch for a proposed fix.

I think the use of the "spf_response_2mx" variable instead of an 
additional, separate "spf_response_fallback" for the fallback branch in 
spfquery.c was laziness on the spfquery author's part.  However, the 
initialization of "spf_response" instead of "spf_response_2mx" was clearly 
erroneous.  Overall, I think Robert's patch for bdo #430508 is sound.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGl/pRwL7PKlBZWjsRAnpuAKC7QdzqLZaA/anMRjEDWU+DywcOPQCdGUpo
H01G+BtYJPDSJGo1tNhA0rg=
=xWK1
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to