I'd like to chime and mention that I have orphaned the package on wnpp
because I can't deal with this shit anymore. Especially since I had
nothing to do with this security update, i have no motivation to deal
with it (in addition to being frustrated with mt-daapd's robustness in
general.)

So if anyone's up to it, upload away.

-Josh

On Fri, Sep 05, 2008 at 10:21:27AM +0200, Martijn Plak wrote:
> My patch was for the r1376 debian package, not r1696. To be precise, it
> fixed an incomplete backport of a security fix. For those sources, it is
> correct.
> 
> In r1376, ws_decodepassword returns 0 on success.  ws_decodepassword was
> changed to return TRUE in r1622.
> 
> If the debian package is upgraded to newer upstream sources, every patch
> needs to be reconsidered. Especially for backported changes, it is not
> surprising the patch is not needed anymore. Which seems to be the case
> here.
> 
> 
> 
> 
> > Package: mt-daapd
> > Version: 0.9~r1696-1.4
> > Followup-For: Bug #496217
> >
> >> Julien BLACHE <[EMAIL PROTECTED]> wrote:
> >> Even in 0.9~r1696-1.4 still refuses valid credentials for the web
> >> interface. I haven't been able to track that down further.
> >
> > The solution proposed by Martijn Plak is not correct, if you look at
> > the source of "webserver.c", the method "ws_decodepassword" returns
> > TRUE if the decoding of the base64 header succeeded. However, TRUE is
> > defined as 1, not 0. So, a better solution would be:
> >
> > +   if((auth) && (TRUE == ws_decodepassword(auth,&username, &password))) {
> >
> > Hope it helps,
> >
> >   Jan Willem
> >
> >
> 
> 
> 

-- 
Joshua Kwan



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to