Package: ppp / 2.4.7-2+4.1+deb10u1
Metadata
Package | Version | Patches format |
---|---|---|
ppp | 2.4.7-2+4.1+deb10u1 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
0001 abort on errors in subdir builds.patch | (download) |
pppd/plugins/Makefile.linux |
8 4 + 4 - 0 ! |
[patch 01/16] abort on errors in subdir builds The current recursive loops do not check the exit status of make in subdirs which leads to `make` passing even when a subdir failed to compile or install. URL: https://bugs.gentoo.org/334727 Signed-off-by: Martin von Gagern <Martin.vGagern@gmx.net> Signed-off-by: Mike Frysinger <vapier@gentoo.org> |
0003 scripts Avoid killing wrong pppd.patch | (download) |
scripts/poff |
2 1 + 1 - 0 ! |
[patch 03/16] scripts: avoid killing wrong pppd poff could kill other pppd processes when there are many pppd |
0004 pppd Fix sign extension when displaying bytes in oct.patch | (download) |
pppd/utils.c |
2 1 + 1 - 0 ! |
[patch 04/16] pppd: fix sign-extension when displaying bytes in octal print_string() displays characters as \\%.03o but without first casting it from "char" to "unsigned char" so it gets sign-extended to an int. This causes output like \37777777630 instead of \230. Signed-off-by: Philip A. Prindeville <philipp@redfish-solutions.com> |
0005 Suppress false error message on PPPoE disconnect.patch | (download) |
pppd/plugins/rp-pppoe/plugin.c |
2 1 + 1 - 0 ! |
[patch 05/16] suppress false error message on pppoe disconnect Once the kernel handles PPPoE PADTs correctly[1], a PADT triggered disconnect will result in EALREADY when pppd tries to clear the session ID. Simply ignore the error if, and only if, the error is EALREADY [1] https://patchwork.ozlabs.org/patch/444717/ Signed-off-by: Simon Farnsworth <simon@farnz.org.uk> |
0006 Send PADT on PPPoE disconnect.patch | (download) |
pppd/plugins/rp-pppoe/plugin.c |
5 3 + 2 - 0 ! |
[patch 06/16] send padt on pppoe disconnect Once we've terminated the PPP session, there is no chance of a PPP layer disconnect. Some PPPoE relays don't detect the PPP session going down, and depend on a long timeout or a PPPoE PADT to terminate the session. Send a PADT on disconnect to work around these buggy relays. Signed-off-by: Simon Farnsworth <simon@farnz.org.uk> |
0007 pppd ipxcp Prevent buffer overrun on remote router n.patch | (download) |
pppd/ipxcp.c |
2 1 + 1 - 0 ! |
[patch 07/16] pppd: ipxcp: prevent buffer overrun on remote router name This fixes an if condition to prevent a possible 1-byte overrun on ipxcp_hisoptions[0].name. Reported-by: "Sabas Rosales, Blanca E" <blanca.e.sabas.rosales@intel.com> Signed-off-by: Paul Mackerras <paulus@ozlabs.org> |
0008 pppd Fix ccp_options.mppe type.patch | (download) |
pppd/ccp.h |
2 1 + 1 - 0 ! |
[patch 08/16] pppd: fix ccp_options.mppe type This corrects the type of ccp_options.mppe; it is actually a bitfield of MPPE_OPT_* and not a boolean. Signed-off-by: Sylvain Rochet <gradator@gradator.net> Signed-off-by: Paul Mackerras <paulus@samba.org> |
0009 pppd Fix ccp_cilen calculated size if both deflate_c.patch | (download) |
pppd/ccp.c |
3 2 + 1 - 0 ! |
[patch 09/16] pppd: fix ccp_cilen calculated size if both deflate_correct and deflate_draft are enabled This fixes a bug where ccp_cilen() will return 4 bytes less than necessary for the addci buffer if both deflate_correct and deflate_draft are enabled. Signed-off-by: Sylvain Rochet <gradator@gradator.net> Signed-off-by: Paul Mackerras <paulus@samba.org> |
0010 Fix a typo in comment. Diff from Yuuichi Someya.patch | (download) |
pppd/fsm.c |
2 1 + 1 - 0 ! |
[patch 10/16] fix a typo in comment. diff from yuuichi someya. |
0011 plog count only relevant lines from syslog.patch | (download) |
scripts/plog |
2 1 + 1 - 0 ! |
[patch 11/16] plog: count only relevant lines from syslog Closes paulusmack/ppp#42 |
0012 Change include from sys errno.h to errno.h.patch | (download) |
pppd/sys-linux.c |
2 1 + 1 - 0 ! |
[patch 12/16] change include from sys/errno.h to errno.h According to POSIX, the canonical location for errno.h is on the top level. Signed-off-by: Stefan Nickl <Stefan.Nickl@gmail.com> |
0013 pppd allow use of arbitrary interface names.patch | (download) |
pppd/main.c |
16 6 + 10 - 0 ! |
[patch 13/16] pppd: allow use of arbitrary interface names This is a modified version of a patch from openSUSE that enables PPP interfaces to be called arbitrary names, rather than simply pppX where X is the unit number. The modifications from the stock openSUSE patch are: |
0014 pppd Remove unused declaration of ttyname.patch | (download) |
pppd/main.c |
1 0 + 1 - 0 ! |
[patch 14/16] pppd: remove unused declaration of ttyname. Signed-off-by: George Burgess IV <george@gbiv.net> |
0015 pppd Provide error implementation in pppoe discovery.patch | (download) |
pppd/plugins/rp-pppoe/pppoe-discovery.c |
9 9 + 0 - 0 ! |
[patch 15/16] pppd: provide error() implementation in pppoe-discovery The pppoe-discovery program calls error() from the CHECK_ROOM macro defined in pppoe.h. Since pppoe-discovery is a standalone program not linked with the rest of pppd, the only way this could build is by linking to glibc's proprietary error(3) function instead of the function |
0016 pppoe include netinet in.h before linux in.h.patch | (download) |
pppd/plugins/rp-pppoe/pppoe.h |
7 4 + 3 - 0 ! |
[patch 16/16] pppoe: include netinet/in.h before linux/in.h This fixes builds with newer kernels. Basically, <netinet/in.h> needs to be included before <linux/in.h> otherwise the earlier, unaware of the latter, tries to redefine symbols and structures. Also, <linux/if_pppox.h> doesn't work alone anymore, since it pulls the headers in the wrong order, so we better include <netinet/in.h> early. |
0017 pppd Fix bounds check in EAP code.patch | (download) |
pppd/eap.c |
4 2 + 2 - 0 ! |
pppd: fix bounds check in eap code |
adaptive_echos | (download) |
pppd/lcp.c |
19 19 + 0 - 0 ! |
--- |
makefiles_cleanup | (download) |
chat/Makefile.linux |
5 3 + 2 - 0 ! |
--- |
close_dev_ppp | (download) |
pppd/sys-linux.c |
7 7 + 0 - 0 ! |
bug#306261: pppd does not properly close /dev/ppp on persist When using the kernel PPPoE driver, pppd never closes /dev/ppp when the link has come down. It opens superfluous fds to the device each time it re-opens the connection, with the unclosed ones falsely reported always ready for data by select(). This makes pppd eat up 100% CPU time after the first persist because of the always instantly returning select() on the unclosed fds. The problem also occurs with the upstream version, but does not occur when a pty/tty device is used for the ppp connection. |
chat_man | (download) |
chat/chat.8 |
5 3 + 2 - 0 ! |
--- |
fix_linkpidfile | (download) |
pppd/main.c |
3 1 + 2 - 0 ! |
bug#284382: ppp: linkpidfile is not created upon detachment |
pppdump_use_zlib | (download) |
pppdump/Makefile.linux |
28 26 + 2 - 0 ! |
--- |
pppoatm_resolver_light | (download) |
pppd/plugins/pppoatm/Makefile.linux |
4 4 + 0 - 0 ! |
--- |
pppoatm_cleanup | (download) |
pppd/plugins/pppoatm/pppoatm.c |
23 13 + 10 - 0 ! |
--- |
pppoe_noads | (download) |
pppd/plugins/rp-pppoe/plugin.c |
3 0 + 3 - 0 ! |
--- |
readable_connerrs | (download) |
pppd/main.c |
2 1 + 1 - 0 ! |
--- |
radius config.c unkown typo | (download) |
pppd/plugins/radius/config.c |
6 3 + 3 - 0 ! |
correct unkown => unknown typo |
pr 28 pppoe custom host uniq tag.patch | (download) |
pppd/plugins/rp-pppoe/common.c |
14 5 + 9 - 0 ! |
[patch] pppoe: custom host-uniq tag |
011_scripts_redialer.diff | (download) |
scripts/redialer |
133 53 + 80 - 0 ! |
--- |
cifdefroute.dif | (download) |
pppd/ipcp.c |
45 40 + 5 - 0 ! |
add replacedefaultroute option Adds an option to pppd to control whether to replace existing default routes when using the 'defaultroute' option. If defaultroute and replacedefaultroute are both set, pppd replaces an existing default route with the new default route. The old default route is restored when the connection is taken down. |
ppp 2.3.11 oedod.dif | (download) |
pppd/demand.c |
99 98 + 1 - 0 ! |
--- |
radius_mtu | (download) |
pppd/plugins/radius/radius.c |
3 3 + 0 - 0 ! |
radius plugin does not set mtu on ppp interface Date: Mon, 22 Jan 2007 12:36:59 +0000 (GMT) Full_Name: Alexander Klepikov Version: 2.4.3 OS: rhl 7.3 (2.4.20-28.7bigmem) |
018_ip up_option.diff | (download) |
pppd/ipcp.c |
8 4 + 4 - 0 ! |
--- |
ppp 2.4.2 stripMSdomain | (download) |
pppd/chap-new.c |
11 11 + 0 - 0 ! |
--- |
setenv_call_file | (download) |
pppd/options.c |
1 1 + 0 - 0 ! |
--- |
ipv6 accept remote | (download) |
pppd/ipv6cp.c |
5 4 + 1 - 0 ! |
--- |
ppp 2.4.4 strncatfix.patch | (download) |
pppd/plugins/radius/clientid.c |
2 1 + 1 - 0 ! |
fix a potential buffer overflow in clientid.c:rc_map2id() This fixes the following compile-time warning when building with -D_FORTIFY_SOURCE=2: In file included from /usr/include/string.h:638:0, from ./includes.h:26, from clientid.c:12: In function 'strncat', inlined from 'rc_map2id' at clientid.c:113:9: /usr/include/i386-linux-gnu/bits/string3.h:150:3: warning: call to __builtin___strncat_chk might overflow destination buffer [enabled by default] return __builtin___strncat_chk (__dest, __src, __len, __bos (__dest)); ^ |
010_scripts_README.diff | (download) |
scripts/README |
14 14 + 0 - 0 ! |
--- |
no_crypt_hack | (download) |
pppd/Makefile.linux |
4 4 + 0 - 0 ! |
--- |
resolv.conf_no_log | (download) |
pppd/ipcp.c |
2 1 + 1 - 0 ! |
--- |
zzz_config | (download) |
pppd/Makefile.linux |
6 2 + 4 - 0 ! |
--- |
secure card interpreter fix | (download) |
scripts/secure-card |
2 1 + 1 - 0 ! |
change path to expect in secure-card example script This fixes the lintian warning: I: ppp: example-wrong-path-for-interpreter usr/share/doc/ppp/examples/scripts/secure-card (#!/usr/local/bin/expect != /usr/bin/expect) |
rc_mksid no buffer overflow | (download) |
pppd/plugins/radius/util.c |
2 1 + 1 - 0 ! |
fix buffer overflow in rc_mksid() rc_mksid converts the PID of pppd to hex to generate a pseudo-unique string. . If the process id is bigger than 65535 (FFFF), its hex representation will be longer than 4 characters, resulting in a buffer overflow. . The bug can be exploited to cause a remote DoS. . |
pppd soname hack.patch | (download) |
pppd/Makefile.linux |
5 4 + 1 - 0 ! |
add a soname to the pppd binary This hack inserts a SONAME into the pppd binary, which allows us to run dpkg-gensymbols/dh_makeshlibs over the resulting binary. This is useful so that we can use Debian's standard build infrastructure to help track the ppp binary's ABI, which is used by plugins. |
eaptls mppe.patch | (download) |
README.eap-tls |
291 291 + 0 - 0 ! |
eap-tls authentication support for ppp |
replace vendored hash functions.patch | (download) |
pppd/Makefile.linux |
25 9 + 16 - 0 ! |
replace vendored hash functions with libcrypto Bug-Debian: https://bugs.debian.org/826625 |