OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Thomas Lotterer
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-src openpkg-web          Date:   17-Oct-2003 11:35:00
  Branch: OPENPKG_1_2_SOLID HEAD           Handle: 2003101710345901

  Modified files:
    openpkg-web             news.txt
  Modified files:           (Branch: OPENPKG_1_2_SOLID)
    openpkg-src/proftpd     proftpd.patch proftpd.spec

  Log:
    Segfault could not be reproduced on FreeBSD 4.9, 5.1, RedHat 9, Debian
    2.2, 3.0, Solaris 9 (iX86); Solaris 8, 9 (SPARC64) but update anyway
    as a safety precaution

  Summary:
    Revision    Changes     Path
    1.2.4.3     +37 -0      openpkg-src/proftpd/proftpd.patch
    1.42.2.1.2.4+1  -1      openpkg-src/proftpd/proftpd.spec
    1.7035      +1  -0      openpkg-web/news.txt
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-src/proftpd/proftpd.patch
  ============================================================================
  $ cvs diff -u -r1.2.4.2 -r1.2.4.3 proftpd.patch
  --- openpkg-src/proftpd/proftpd.patch 24 Sep 2003 07:08:59 -0000      1.2.4.2
  +++ openpkg-src/proftpd/proftpd.patch 17 Oct 2003 09:35:00 -0000      1.2.4.3
  @@ -187,3 +187,40 @@
        int gl_flags;
    
        /* If the GLOB_ALTDIRFUNC flag is set, the following functions
  +
  +It looks like Proftpd versions 1.2.7p and 1.2.8p at least
  +(the versions patched for the ISS ASCII transfer buffer overflow
  +vulnerability) are vulnerable to some kind of buffer overflow:
  +
  +    http://bugs.proftpd.org/show_bug.cgi?id=2190
  +    http://bugs.proftpd.org/show_bug.cgi?id=2194
  +
  +--- src/data.c.orig  2003-10-16 17:55:28.000000000 +0200
  ++++ src/data.c       2003-10-16 17:56:22.000000000 +0200
  +@@ -154,15 +154,9 @@
  +     memmove(copy_buf, tmpbuf, tmplen);
  + 
  +     /* Allocate a new session.xfer.buf of the needed size. */
  +-    session.xfer.bufsize = tmplen + lfcount;
  ++    session.xfer.bufsize = tmplen + lfcount + 1;
  +     session.xfer.buf = pcalloc(session.xfer.p, session.xfer.bufsize);
  + 
  +-    /* Allow space for a CR to be inserted before an LF if an LF is the
  +-     * first character in the buffer.
  +-     */
  +-    session.xfer.buf++;
  +-    session.xfer.bufstart = session.xfer.buf;
  +-
  +     memmove(session.xfer.buf, copy_buf, tmplen);
  +     destroy_pool(copy_pool);
  + 
  +@@ -194,8 +188,6 @@
  +     }
  +   }
  + 
  +-  /* Always make sure the buffer is NUL-terminated. */
  +-  tmpbuf[tmplen + added] = '\0';
  +   *buf = tmpbuf;
  +   *buflen = tmplen + added;
  + }
  +
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/proftpd/proftpd.spec
  ============================================================================
  $ cvs diff -u -r1.42.2.1.2.3 -r1.42.2.1.2.4 proftpd.spec
  --- openpkg-src/proftpd/proftpd.spec  24 Sep 2003 07:08:59 -0000      1.42.2.1.2.3
  +++ openpkg-src/proftpd/proftpd.spec  17 Oct 2003 09:35:00 -0000      1.42.2.1.2.4
  @@ -33,7 +33,7 @@
   Group:        FTP
   License:      GPL
   Version:      1.2.7
  -Release:      1.2.1
  +Release:      1.2.2
   
   #   package options
   %option       with_pam  no
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-web/news.txt
  ============================================================================
  $ cvs diff -u -r1.7034 -r1.7035 news.txt
  --- openpkg-web/news.txt      17 Oct 2003 09:33:51 -0000      1.7034
  +++ openpkg-web/news.txt      17 Oct 2003 09:34:59 -0000      1.7035
  @@ -1,3 +1,4 @@
  +17-Oct-2003: Upgraded package: P<proftpd-1.2.7-1.2.2>
   17-Oct-2003: Upgraded package: P<proftpd-1.2.8-1.3.2>
   17-Oct-2003: Upgraded package: P<mozilla-1.5-20031017>
   16-Oct-2003: Upgraded package: P<perl-curses-20031016-20031016>
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to