Hello community,

here is the log from the commit of package vsftpd for openSUSE:Factory checked 
in at 2016-09-27 13:41:09
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/vsftpd (Old)
 and      /work/SRC/openSUSE:Factory/.vsftpd.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "vsftpd"

Changes:
--------
--- /work/SRC/openSUSE:Factory/vsftpd/vsftpd.changes    2016-09-05 
21:12:26.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.vsftpd.new/vsftpd.changes       2016-09-27 
13:41:11.000000000 +0200
@@ -1,0 +2,8 @@
+Mon Sep 19 11:39:04 UTC 2016 - [email protected]
+
+- Add vsftpd-3.0.2-fix-chown-uploads.patch to fix a bug in vsftpd
+  where files uploaded by an anonymous user could not be chown()ed
+  to the desired UID as specified in the daemon's configuration
+  file. [bnc#996370]
+  
+-------------------------------------------------------------------

New:
----
  vsftpd-3.0.2-fix-chown-uploads.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ vsftpd.spec ++++++
--- /var/tmp/diff_new_pack.von4JE/_old  2016-09-27 13:41:14.000000000 +0200
+++ /var/tmp/diff_new_pack.von4JE/_new  2016-09-27 13:41:14.000000000 +0200
@@ -69,6 +69,7 @@
 Patch23:        vsftpd-ls-memleak.patch
 #PATCH-FIX-UPSTREAM: bnc#970982
 Patch24:        vsftpd-3.0.2-wnohang.patch
+Patch25:        vsftpd-3.0.2-fix-chown-uploads.patch
 BuildRequires:  libcap-devel
 BuildRequires:  openssl-devel
 BuildRequires:  pam-devel
@@ -118,6 +119,7 @@
 %patch22 -p1
 %patch23 -p1
 %patch24 -p1
+%patch25 -p1
 
 %build
 %define seccomp_opts -D_GNU_SOURCE -DUSE_SECCOMP

++++++ vsftpd-3.0.2-fix-chown-uploads.patch ++++++
Index: vsftpd-3.0.2/seccompsandbox.c
===================================================================
--- vsftpd-3.0.2.orig/seccompsandbox.c
+++ vsftpd-3.0.2/seccompsandbox.c
@@ -475,6 +475,10 @@ seccomp_sandbox_setup_postlogin(const st
       /* Need to send file descriptors to privileged broker. */
       allow_nr_1_arg_match(__NR_sendmsg, 3, 0);
     }
+    if (is_anon && tunable_chown_uploads)
+    {
+      allow_nr(__NR_fchmod);
+    }
   }
 
   if (tunable_syslog_enable)
@@ -538,6 +542,12 @@ seccomp_sandbox_setup_postlogin_broker()
   seccomp_sandbox_setup_base();
   seccomp_sandbox_setup_data_connections();
   allow_nr_1_arg_match(__NR_sendmsg, 3, 0);
+  if (tunable_chown_uploads)
+  {
+    allow_nr(__NR_fstat);
+    allow_nr(__NR_fchown);
+    allow_nr_1_arg_match(__NR_recvmsg, 3, 0);
+  }
 }
 
 void


Reply via email to