diff options
author | 2007-06-26 17:59:23 +0000 | |
---|---|---|
committer | 2007-06-26 17:59:23 +0000 | |
commit | 68c865b653c838533fe36e5916f9db630fd57e5d (patch) | |
tree | 72c90aaaf5f6565728ec22eb1f26bc8fd08d2916 /net-ftp/vsftpd/files | |
parent | New package requested by dertobi123 (diff) | |
download | gentoo-2-68c865b653c838533fe36e5916f9db630fd57e5d.tar.gz gentoo-2-68c865b653c838533fe36e5916f9db630fd57e5d.tar.bz2 gentoo-2-68c865b653c838533fe36e5916f9db630fd57e5d.zip |
Fix anon umask uploads, #183213 thanks to Serhij S. Stasyuk
(Portage version: 2.1.3_rc5)
Diffstat (limited to 'net-ftp/vsftpd/files')
-rw-r--r-- | net-ftp/vsftpd/files/digest-vsftpd-2.0.5-r3 | 3 | ||||
-rw-r--r-- | net-ftp/vsftpd/files/vsftpd-2.0.5-anon-upload-umask.patch | 22 |
2 files changed, 25 insertions, 0 deletions
diff --git a/net-ftp/vsftpd/files/digest-vsftpd-2.0.5-r3 b/net-ftp/vsftpd/files/digest-vsftpd-2.0.5-r3 new file mode 100644 index 000000000000..162037302490 --- /dev/null +++ b/net-ftp/vsftpd/files/digest-vsftpd-2.0.5-r3 @@ -0,0 +1,3 @@ +MD5 146062e8b2f93af43ff6c2c770feea94 vsftpd-2.0.5.tar.gz 155985 +RMD160 297c383aae9fd90f75d5d6a62b2ed5e54adf25d4 vsftpd-2.0.5.tar.gz 155985 +SHA256 5462ebf0df2792dde8ea3cf5d87c715200aac388554b3f0a9ace6265edecfa5b vsftpd-2.0.5.tar.gz 155985 diff --git a/net-ftp/vsftpd/files/vsftpd-2.0.5-anon-upload-umask.patch b/net-ftp/vsftpd/files/vsftpd-2.0.5-anon-upload-umask.patch new file mode 100644 index 000000000000..223744b8f58e --- /dev/null +++ b/net-ftp/vsftpd/files/vsftpd-2.0.5-anon-upload-umask.patch @@ -0,0 +1,22 @@ +From: Bruno Cornec <Bruno.Cornec@hp.com> +To: 269193@bugs.debian.org +Subject: Proposal of patch +Date: Wed, 2 May 2007 19:51:49 +0200 + +Hello, + +I'm not a Debian contributer, but a Mandriva one. +Here is the patch I made for the Mandriva cooker package. +Maybe it could be useful, or at least serve as a base for discussion: + +--- vsftpd-2.0.5/postlogin.c.orig 2007-05-02 19:43:54.000000000 +0200 ++++ vsftpd-2.0.5/postlogin.c 2007-05-02 19:44:28.000000000 +0200 +@@ -1009,7 +1009,7 @@ + /* Are we required to chown() this file for security? */ + if (p_sess->is_anonymous && tunable_chown_uploads) + { +- vsf_sysutil_fchmod(new_file_fd, 0600); ++ vsf_sysutil_fchmod(new_file_fd, (0777 & ~tunable_anon_umask)); + if (tunable_one_process_model) + { + vsf_one_process_chown_upload(p_sess, new_file_fd); |