Scott Kitterman: > I have been remiss in forwarding this bug report, thinking I would get time > to > build a concise test case. It keeps not happening, so here you go. > > A Debian user reported [1] a problem where their cleanup process was killed > by > signal 11 during local mail injection: > > Aug 06 16:57:30 amilcar postfix/pickup[11470]: warning: > maildrop/88D7A333A: error writing 7082252D6: queue file write error > Aug 06 16:57:30 amilcar postfix/master[6205]: warning: process > /usr/lib/postfix/sbin/cleanup pid 18641 killed by signal 11 > > We did the usual is it apparmor dance. They did provide a trace [2]. After > some work they discovered that the users associated with all the failures had > a passwd comment set to a single space, e.g.[3]: > > username:x:1234:1234: :/home/username:/bin/bash > > This was using Postfix 3.4.14. > > Any suggestions?
This was FIXED IN JULY 2021 with: postfix-3.3.19 postfix-3.4.22 postfix-3.5.12 postfix-3.6.2 Do we have a process problem? Wietse 20210705 Bugfix (introduced: Postfix 3.3): "null pointer read" error in the cleanup daemon when "header_from_format = standard" (the default as of Postfix 3.3) and email was submitted with /usr/sbin/sendmail without From: header, and an all-space full name was specified in 1) the password file, 2) with "sendmail -F", or 3) with the NAME environment variable. Found by Renaud Metrich. File: cleanup/cleanup_message.c.