From 5da4fc457bfe10e575b7aa2f4399f375c18cc209 Mon Sep 17 00:00:00 2001 From: cpiazza Date: Mon, 30 Aug 1999 19:14:07 +0000 Subject: Add a PATCH_FILE to close a security hole in wu-ftpd. Quoted from wu-ftpd group's accouncement: Due to insufficient bounds checking on directory name lengths which can be supplied by users, it is possible to overwrite the static memory space of the wu-ftpd daemon while it is executing under certain configurations. By having the ability to create directories and supplying carefully designed directory names to the wu-ftpd, users may gain privileged access. PR: 13475 Submitted by: jack@germanium.xtalwind.net --- ftp/wu-ftpd+ipv6/distinfo | 1 + 1 file changed, 1 insertion(+) (limited to 'ftp/wu-ftpd+ipv6/distinfo') diff --git a/ftp/wu-ftpd+ipv6/distinfo b/ftp/wu-ftpd+ipv6/distinfo index 213f7f2..0a18728 100644 --- a/ftp/wu-ftpd+ipv6/distinfo +++ b/ftp/wu-ftpd+ipv6/distinfo @@ -1 +1,2 @@ MD5 (wu-ftpd-2.5.0.tar.gz) = 98f9c8490e0d1ca2c3c57e60e65803b7 +MD5 (mapped.path.overrun.patch) = b01b65652eb3816f0ab11971ac52424d -- cgit v1.1