[SCM] proftpd-dfsg branch, master, updated. debian/1.3.3a-6-42-g2f48c4e

Francesco Paolo Lovergine frankie at debian.org
Sat Apr 9 15:23:26 UTC 2011


The following commit has been merged in the master branch:
commit 7a5d108b2061b355450bbdf142c8ef748038ec20
Author: Francesco Paolo Lovergine <frankie at debian.org>
Date:   Sat Apr 9 17:06:24 2011 +0200

    New upstream RC version.

diff --git a/debian/changelog b/debian/changelog
index e38af52..e37fabc 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,4 +1,4 @@
-proftpd-dfsg (1.3.4~rc1+20110317-1) unstable; urgency=low
+proftpd-dfsg (1.3.4~rc4-1) unstable; urgency=low
 
   [ Mahyuddin Susanto <udienz at ubuntu.com> ]
 
@@ -37,7 +37,7 @@ proftpd-dfsg (1.3.4~rc1+20110317-1) unstable; urgency=low
   [ Francesco Paolo Lovergine ]
 
   * Annotated CVE IDs in debian/changelog for recent vulnerabilities fixed.
-  * New upstream snapshot from 1.3.4 pre-release series.
+  * New upstream release candidate for 1.3.4 series.
   * Patch removed: 
         debian/patches/prxs (merged upstream)
   * Patch updated:
@@ -50,9 +50,6 @@ proftpd-dfsg (1.3.4~rc1+20110317-1) unstable; urgency=low
   * Moved ftp user home to /srv/ftp as used by other ftp servers.
   * Now ftp home and user are removed on purge (old or new one).
   * Removing the whole log directory on purge.
-  * [SECURITY,PATCH] 3624 This patch fixes the issue by causing mod_tls 
-    to clear the buffers of any data received from the client, once the SSL/TLS 
-    handshake has succeeded.
   * Now lastlog logging is enabled at building time to allow UseLastlog on/off 
     use in configuration. Thanks TerminX.
 
diff --git a/debian/patches/3624 b/debian/patches/3624
deleted file mode 100644
index 56e0960..0000000
--- a/debian/patches/3624
+++ /dev/null
@@ -1,44 +0,0 @@
-Index: proftpd-dfsg/contrib/mod_tls.c
-===================================================================
---- proftpd-dfsg.orig/contrib/mod_tls.c	2011-03-23 09:56:16.000000000 +0100
-+++ proftpd-dfsg/contrib/mod_tls.c	2011-03-23 10:46:50.000000000 +0100
-@@ -3004,9 +3004,20 @@
- 
-   /* Stash the SSL object in the pointers of the correct NetIO streams. */
-   if (conn == session.c) {
-+    pr_buffer_t *strm_buf;
-+
-     ctrl_ssl = ssl;
-     tls_ctrl_rd_nstrm->strm_data = tls_ctrl_wr_nstrm->strm_data = (void *) ssl;
- 
-+    /* Clear any data from the NetIO stream buffers which may have been read
-+     * in before the SSL/TLS handshake occurred (Bug#3624).
-+     */
-+    strm_buf = tls_ctrl_rd_nstrm->strm_buf;
-+    if (strm_buf != NULL) {
-+      strm_buf->current = NULL;
-+      strm_buf->remaining = strm_buf->buflen;
-+    }
-+
- #if OPENSSL_VERSION_NUMBER >= 0x009080dfL
-     if (SSL_get_secure_renegotiation_support(ssl) == 1) {
-       /* If the peer indicates that it can support secure renegotiations,
-@@ -3018,7 +3029,18 @@
- #endif /* OpenSSL 0.9.8m and later */
- 
-   } else if (conn == session.d) {
-+    pr_buffer_t *strm_buf;
-+
-     tls_data_rd_nstrm->strm_data = tls_data_wr_nstrm->strm_data = (void *) ssl;
-+
-+    /* Clear any data from the NetIO stream buffers which may have been read
-+     * in before the SSL/TLS handshake occurred (Bug#3624).
-+     */
-+    strm_buf = tls_data_rd_nstrm->strm_buf;
-+    if (strm_buf != NULL) {
-+      strm_buf->current = NULL;
-+      strm_buf->remaining = strm_buf->buflen;
-+    }
-   }
- 
- #if OPENSSL_VERSION_NUMBER == 0x009080cfL
diff --git a/debian/patches/series b/debian/patches/series
index ee929f3..8c40ce7 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -11,4 +11,3 @@ odbc
 mod_vroot
 silent
 use_hypen_in_manpage
-3624

-- 
ProFTPD core package



More information about the Pkg-proftpd-maintainers mailing list