fixup! WIP: allow_insecure_tainted_data
authorHeiko Schlittermann (HS12-RIPE) <hs@schlittermann.de>
Mon, 12 Apr 2021 08:10:02 +0000 (10:10 +0200)
committerHeiko Schlittermann (HS12-RIPE) <hs@schlittermann.de>
Mon, 12 Apr 2021 08:10:02 +0000 (10:10 +0200)
src/src/functions.h

index 64fbfcbfc31b06085b88c6a4d003e95707ef6068..2bb4b091120d71e6244d9e6b5414ef44837b8ded 100644 (file)
@@ -1165,7 +1165,6 @@ return -1;
 static inline int
 exim_openat(int dirfd, const char *pathname, int flags)
 {
-uschar *msg;
 if (!is_tainted2(pathname, LOG_MAIN|LOG_PANIC, "Tainted filename '%s'", pathname))
   return openat(dirfd, pathname, flags);
 errno = EACCES;