http://bugzilla.spamassassin.org/show_bug.cgi?id=3527





------- Additional Comments From [EMAIL PROTECTED]  2004-06-28 02:03 -------
I see the problem this caused with spamd_protocol_10.t and the proper fix.

The short version of the explanation is that the code in 2.63 is correct and
this code is a kludge that is not only more tricky but also is slightly off.

I'll prepare a patch for review.

Here's the long version of the explanation:

spamd_protocol_10 tests protocol verion 1.0 which did not have content_length.
The line that this patch changed compares a counter variable with a dereferenced
reference. When there is a content_length, that is what the reference points to.
When there isn't, the reference points to the counter variable itself. The
comparison is supposed to always fail in that case, causing the loop to keep
going until EOF. By changing the > to a >= the comparison always is true instead
of always being false, causing tghe loop to stop before any input is read
instead of continuing until EOF.

This does imply that spamd will not work with SSL without the correct
content_length, i.e., it will onl work with protocol version greater than 1.0.





------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to