proftpd: fix integer overflow CVE-2013-4359
authorHongxu Jia <hongxu.jia@windriver.com>
Tue, 2 Sep 2014 03:24:17 +0000 (11:24 +0800)
committerPatrick Ohly <patrick.ohly@intel.com>
Fri, 9 Jan 2015 16:42:16 +0000 (08:42 -0800)
commit1990827d55a2d53f64c0a9b47d88d88932131e95
treeddb5692e9102793d367b57679a04a599a97cac55
parent3e055c27c2ea8476e4dc7e91d98a46609bd291b0
proftpd: fix integer overflow CVE-2013-4359

Integrate a patch from proftpd upstream to fix an integer overflow bug
described in the CVE-2013-4359, which allows remote attachers to cause
a denial of service (memory consumption) attack.

Refer: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4359

(From meta-openembedded rev: af971abbf0657ec40bb8d8d4516c077c76d52dd0)

Signed-off-by: Shan Hai <shan.hai@windriver.com>
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Signed-off-by: Patrick Ohly <patrick.ohly@intel.com>
meta-openembedded/meta-networking/recipes-daemons/proftpd/files/proftpd-sftp.patch [new file with mode: 0644]
meta-openembedded/meta-networking/recipes-daemons/proftpd/proftpd_1.3.4b.bb