Your message dated Sun, 20 Jan 2008 19:32:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#392927: fixed in libspf 0.999-1.0.0-p3-4
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: spfmilter
Version: 1.99+0.95
The spfmilter process dies and the sendmail gateway hangs in a wait. A
attached GDB shows the following:
Program received signal SIGABRT, Aborted.
[Switching to Thread 1098918240 (LWP 9663)]
0x00002aaaaaf2611d in raise () from /lib/libc.so.6
(gdb) bt
#0 0x00002aaaaaf2611d in raise () from /lib/libc.so.6
#1 0x00002aaaaaf2784e in abort () from /lib/libc.so.6
#2 0x00002aaaaaf5ae41 in __fsetlocking () from /lib/libc.so.6
#3 0x00002aaaaaf6090e in malloc_usable_size () from /lib/libc.so.6
#4 0x00002aaaaaf60c56 in free () from /lib/libc.so.6
#5 0x00002aaaaade8261 in SPF_smtp_from () from /usr/lib/libspf-1.0.so.0
#6 0x0000000000402b7e in ?? ()
#7 0x00002aaaaabc773d in st_sender (g=0x41802140) at engine.c:853
#8 0x00002aaaaabc6bbe in mi_engine (ctx=0x511070) at engine.c:355
#9 0x00002aaaaabc8b1f in mi_handle_session (ctx=0x511070) at handler.c:45
#10 0x00002aaaaabc78d9 in mi_thread_handle_wrapper (arg=0x2358) at
listener.c:566
#11 0x00002aaaaacd60fa in start_thread () from /lib/libpthread.so.0
#12 0x00002aaaaafbece2 in clone () from /lib/libc.so.6
#13 0x0000000000000000 in ?? ()
The error is reproducible. A quick look into src/libspf/main.c and here
in function SPF_smtp_from
/*
* Comment by: James Couzens <[EMAIL PROTECTED]>
* Date: 04/17/05
*
* xfree can be called to attempt to free memory even if its already freed
* but thats no excuse to be abusing it, its there to catch mistakes, not
* to ack as a lazy coder facilitation device
*
* The reason freeing is being attempted is because it appears that people
* have been attempting to call this function multiple times within a
single
* SPF parse, which logically would result in memory leakage because
SPF_close
* isn't being called.
*
* I honestly don't think its safe to be calling this function more than
* once but some users have reported success, I'll have to look into
this...
*/
Maybe this could be the reason, why SIGABORT happens? Maybe the same
error as in Debian Bug #315196 ... <mailto:[EMAIL PROTECTED]>
Regards
Herbert Straub
--- End Message ---
--- Begin Message ---
Source: libspf
Source-Version: 0.999-1.0.0-p3-4
We believe that the bug you reported is fixed in the latest version of
libspf, which is due to be installed in the Debian FTP archive:
libspf-dev_0.999-1.0.0-p3-4_i386.deb
to pool/main/libs/libspf/libspf-dev_0.999-1.0.0-p3-4_i386.deb
libspf-doc_0.999-1.0.0-p3-4_all.deb
to pool/main/libs/libspf/libspf-doc_0.999-1.0.0-p3-4_all.deb
libspf0_0.999-1.0.0-p3-4_i386.deb
to pool/main/libs/libspf/libspf0_0.999-1.0.0-p3-4_i386.deb
libspf_0.999-1.0.0-p3-4.diff.gz
to pool/main/libs/libspf/libspf_0.999-1.0.0-p3-4.diff.gz
libspf_0.999-1.0.0-p3-4.dsc
to pool/main/libs/libspf/libspf_0.999-1.0.0-p3-4.dsc
spfqtool_0.999-1.0.0-p3-4_i386.deb
to pool/main/libs/libspf/spfqtool_0.999-1.0.0-p3-4_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Scott Kitterman <[EMAIL PROTECTED]> (supplier of updated libspf package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sun, 20 Jan 2008 13:30:06 -0500
Source: libspf
Binary: spfqtool libspf-doc libspf0 libspf-dev
Architecture: source all i386
Version: 0.999-1.0.0-p3-4
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group <[EMAIL PROTECTED]>
Changed-By: Scott Kitterman <[EMAIL PROTECTED]>
Description:
libspf-dev - the ANSI C SPF reference library (development files)
libspf-doc - the ANSI C SPF reference library (documentation)
libspf0 - the ANSI C SPF reference library (runtime library)
spfqtool - command-line SPF query tool
Closes: 392927 459082
Changes:
libspf (0.999-1.0.0-p3-4) unstable; urgency=low
.
* QA upload.
* Change src/libspf/main.c to fix memory leak that causes crashes with
spf-milter (closes: #392927)
* Fix bashism in debian rules (closes: #459082)
Files:
05d1a8ee3c431b81de82cb654b40719c 645 mail extra libspf_0.999-1.0.0-p3-4.dsc
e636c5ec9bdbaa84afba3e276def9a02 7882 mail extra
libspf_0.999-1.0.0-p3-4.diff.gz
da2cd8505959980159f9924bd79b9939 829800 doc extra
libspf-doc_0.999-1.0.0-p3-4_all.deb
eac9b30d273843b7162d1bb6965cfe35 32968 libdevel extra
libspf-dev_0.999-1.0.0-p3-4_i386.deb
b51ab1a9319f1770760f6d149dcac672 33330 libs extra
libspf0_0.999-1.0.0-p3-4_i386.deb
ca40daff23c2cfee48f87cf323e2ed28 5866 mail extra
spfqtool_0.999-1.0.0-p3-4_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHk6A72hliNwI7P08RAhAWAKDNiDmHaxZnTHg25uQTqapYv+7PYgCgvG0B
RopAYTVAE3rwXVqaO1F03Ag=
=UHsg
-----END PGP SIGNATURE-----
--- End Message ---