aboutsummaryrefslogtreecommitdiffstats
path: root/ftp/proftpd
diff options
context:
space:
mode:
authordelphij <delphij@FreeBSD.org>2011-12-24 03:08:39 +0800
committerdelphij <delphij@FreeBSD.org>2011-12-24 03:08:39 +0800
commitb0fefe48df43af51b1e51ab698a46c678780c9b0 (patch)
tree1db458cb2ffcdad97567227f22b1e53ad2ac0a0a /ftp/proftpd
parentda83448c003f4ce37d7355e714518a10c97fc6c5 (diff)
downloadfreebsd-ports-gnome-b0fefe48df43af51b1e51ab698a46c678780c9b0.tar.gz
freebsd-ports-gnome-b0fefe48df43af51b1e51ab698a46c678780c9b0.tar.zst
freebsd-ports-gnome-b0fefe48df43af51b1e51ab698a46c678780c9b0.zip
Apply a patch after FreeBSD-SA-11:07.chroot which addresses an arbitrary
code execution vulnerability. Please note that in order to build this the system needs to be patched with FreeBSD-SA-11:07.chroot and the resulting binary also needs to the change because it depends on a new libc API. Feature safe: yes Approved by: portmgr, maintainer (mm)
Diffstat (limited to 'ftp/proftpd')
-rw-r--r--ftp/proftpd/Makefile1
-rw-r--r--ftp/proftpd/files/patch-src-fsio.c19
2 files changed, 20 insertions, 0 deletions
diff --git a/ftp/proftpd/Makefile b/ftp/proftpd/Makefile
index a284d983aa84..4e2c0d081003 100644
--- a/ftp/proftpd/Makefile
+++ b/ftp/proftpd/Makefile
@@ -7,6 +7,7 @@
PORTNAME= proftpd
PORTVERSION= 1.3.3g
+PORTREVISION= 1
CATEGORIES?= ftp
MASTER_SITES= ftp://ftp.proftpd.org/distrib/source/ \
ftp://ftp.fastorama.com/mirrors/ftp.proftpd.org/distrib/source/ \
diff --git a/ftp/proftpd/files/patch-src-fsio.c b/ftp/proftpd/files/patch-src-fsio.c
new file mode 100644
index 000000000000..22e66f6f7ab2
--- /dev/null
+++ b/ftp/proftpd/files/patch-src-fsio.c
@@ -0,0 +1,19 @@
+--- src/fsio.c.orig 2010-04-12 12:00:00.000000000 -0700
++++ src/fsio.c 2011-12-16 15:12:07.799166185 -0800
+@@ -50,6 +50,8 @@
+ # include <acl/libacl.h>
+ #endif
+
++#include <unistd.h>
++
+ typedef struct fsopendir fsopendir_t;
+
+ struct fsopendir {
+@@ -287,6 +289,7 @@
+ static int sys_chroot(pr_fs_t *fs, const char *path) {
+ if (chroot(path) < 0)
+ return -1;
++ __FreeBSD_libc_enter_restricted_mode();
+
+ session.chroot_path = (char *) path;
+ return 0;