Package: ppp / 2.4.7-2+4.1+deb10u1

Metadata

Package Version Patches format
ppp 2.4.7-2+4.1+deb10u1 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
0001 abort on errors in subdir builds.patch | (download)

pppd/plugins/Makefile.linux | 8 4 + 4 - 0 !
1 file changed, 4 insertions(+), 4 deletions(-)

 [patch 01/16] abort on errors in subdir builds

The current recursive loops do not check the exit status of make
in subdirs which leads to `make` passing even when a subdir failed
to compile or install.

URL: https://bugs.gentoo.org/334727
Signed-off-by: Martin von Gagern <Martin.vGagern@gmx.net>
Signed-off-by: Mike Frysinger <vapier@gentoo.org>

0003 scripts Avoid killing wrong pppd.patch | (download)

scripts/poff | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 [patch 03/16]  scripts: avoid killing wrong pppd

 poff could kill other pppd processes when there are many pppd
0004 pppd Fix sign extension when displaying bytes in oct.patch | (download)

pppd/utils.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 [patch 04/16] pppd: fix sign-extension when displaying bytes in octal

print_string() displays characters as \\%.03o but without first
casting it from "char" to "unsigned char" so it gets sign-extended
to an int. This causes output like \37777777630 instead of \230.

Signed-off-by: Philip A. Prindeville <philipp@redfish-solutions.com>

0005 Suppress false error message on PPPoE disconnect.patch | (download)

pppd/plugins/rp-pppoe/plugin.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 [patch 05/16] suppress false error message on pppoe disconnect

Once the kernel handles PPPoE PADTs correctly[1], a PADT triggered
disconnect will result in EALREADY when pppd tries to clear the session ID.

Simply ignore the error if, and only if, the error is EALREADY

[1] https://patchwork.ozlabs.org/patch/444717/

Signed-off-by: Simon Farnsworth <simon@farnz.org.uk>

0006 Send PADT on PPPoE disconnect.patch | (download)

pppd/plugins/rp-pppoe/plugin.c | 5 3 + 2 - 0 !
1 file changed, 3 insertions(+), 2 deletions(-)

 [patch 06/16] send padt on pppoe disconnect

Once we've terminated the PPP session, there is no chance of a PPP layer
disconnect. Some PPPoE relays don't detect the PPP session going down, and
depend on a long timeout or a PPPoE PADT to terminate the session.

Send a PADT on disconnect to work around these buggy relays.

Signed-off-by: Simon Farnsworth <simon@farnz.org.uk>

0007 pppd ipxcp Prevent buffer overrun on remote router n.patch | (download)

pppd/ipxcp.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 [patch 07/16] pppd: ipxcp: prevent buffer overrun on remote router
 name

This fixes an if condition to prevent a possible 1-byte overrun
on ipxcp_hisoptions[0].name.

Reported-by: "Sabas Rosales, Blanca E" <blanca.e.sabas.rosales@intel.com>
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>

0008 pppd Fix ccp_options.mppe type.patch | (download)

pppd/ccp.h | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 [patch 08/16] pppd: fix ccp_options.mppe type

This corrects the type of ccp_options.mppe; it is actually a bitfield of
MPPE_OPT_* and not a boolean.

Signed-off-by: Sylvain Rochet <gradator@gradator.net>
Signed-off-by: Paul Mackerras <paulus@samba.org>

0009 pppd Fix ccp_cilen calculated size if both deflate_c.patch | (download)

pppd/ccp.c | 3 2 + 1 - 0 !
1 file changed, 2 insertions(+), 1 deletion(-)

 [patch 09/16] pppd: fix ccp_cilen calculated size if both
 deflate_correct and deflate_draft are enabled

This fixes a bug where ccp_cilen() will return 4 bytes less than
necessary for the addci buffer if both deflate_correct and
deflate_draft are enabled.

Signed-off-by: Sylvain Rochet <gradator@gradator.net>
Signed-off-by: Paul Mackerras <paulus@samba.org>

0010 Fix a typo in comment. Diff from Yuuichi Someya.patch | (download)

pppd/fsm.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 [patch 10/16] fix a typo in comment.  diff from yuuichi someya.


0011 plog count only relevant lines from syslog.patch | (download)

scripts/plog | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 [patch 11/16] plog: count only relevant lines from syslog

Closes paulusmack/ppp#42

0012 Change include from sys errno.h to errno.h.patch | (download)

pppd/sys-linux.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 [patch 12/16] change include from sys/errno.h to errno.h

According to POSIX, the canonical location for errno.h is on the top level.

Signed-off-by: Stefan Nickl <Stefan.Nickl@gmail.com>

0013 pppd allow use of arbitrary interface names.patch | (download)

pppd/main.c | 16 6 + 10 - 0 !
pppd/options.c | 5 5 + 0 - 0 !
pppd/pppd.8 | 8 7 + 1 - 0 !
pppd/pppd.h | 11 11 + 0 - 0 !
pppd/sys-linux.c | 15 15 + 0 - 0 !
pppstats/pppstats.c | 12 6 + 6 - 0 !
6 files changed, 50 insertions(+), 17 deletions(-)

 [patch 13/16] pppd: allow use of arbitrary interface names

This is a modified version of a patch from openSUSE that enables PPP interfaces
to be called arbitrary names, rather than simply pppX where X is the unit
number.

The modifications from the stock openSUSE patch are:
0014 pppd Remove unused declaration of ttyname.patch | (download)

pppd/main.c | 1 0 + 1 - 0 !
1 file changed, 1 deletion(-)

 [patch 14/16] pppd: remove unused declaration of ttyname.

Signed-off-by: George Burgess IV <george@gbiv.net>

0015 pppd Provide error implementation in pppoe discovery.patch | (download)

pppd/plugins/rp-pppoe/pppoe-discovery.c | 9 9 + 0 - 0 !
1 file changed, 9 insertions(+)

 [patch 15/16] pppd: provide error() implementation in pppoe-discovery

The pppoe-discovery program calls error() from the CHECK_ROOM macro
defined in pppoe.h. Since pppoe-discovery is a standalone program not
linked with the rest of pppd, the only way this could build is by
linking to glibc's proprietary error(3) function instead of the function
0016 pppoe include netinet in.h before linux in.h.patch | (download)

pppd/plugins/rp-pppoe/pppoe.h | 7 4 + 3 - 0 !
1 file changed, 4 insertions(+), 3 deletions(-)

 [patch 16/16] pppoe: include netinet/in.h before linux/in.h

This fixes builds with newer kernels. Basically, <netinet/in.h> needs to be
included before <linux/in.h> otherwise the earlier, unaware of the latter,
tries to redefine symbols and structures. Also, <linux/if_pppox.h> doesn't work
alone anymore, since it pulls the headers in the wrong order, so we better
include <netinet/in.h> early.

0017 pppd Fix bounds check in EAP code.patch | (download)

pppd/eap.c | 4 2 + 2 - 0 !
1 file changed, 2 insertions(+), 2 deletions(-)

 pppd: fix bounds check in eap code
adaptive_echos | (download)

pppd/lcp.c | 19 19 + 0 - 0 !
pppd/pppd.8 | 5 5 + 0 - 0 !
2 files changed, 24 insertions(+)

---
makefiles_cleanup | (download)

chat/Makefile.linux | 5 3 + 2 - 0 !
pppd/Makefile.linux | 7 4 + 3 - 0 !
pppd/plugins/Makefile.linux | 4 2 + 2 - 0 !
pppd/plugins/pppoatm/Makefile.linux | 4 2 + 2 - 0 !
pppd/plugins/pppol2tp/Makefile.linux | 4 2 + 2 - 0 !
pppd/plugins/radius/Makefile.linux | 16 9 + 7 - 0 !
pppd/plugins/rp-pppoe/Makefile.linux | 10 6 + 4 - 0 !
pppdump/Makefile.linux | 9 6 + 3 - 0 !
pppstats/Makefile.linux | 7 4 + 3 - 0 !
9 files changed, 38 insertions(+), 28 deletions(-)

---
close_dev_ppp | (download)

pppd/sys-linux.c | 7 7 + 0 - 0 !
1 file changed, 7 insertions(+)

 bug#306261: pppd does not properly close /dev/ppp on persist

When using the kernel PPPoE driver, pppd never
closes /dev/ppp when the link has come down.

It opens superfluous fds to the device each time it re-opens the
connection, with the unclosed ones falsely reported always ready for
data by select().

This makes pppd eat up 100% CPU time after the first persist because of
the always instantly returning select() on the unclosed fds.

The problem also occurs with the upstream version, but does not occur
when a pty/tty device is used for the ppp connection.



chat_man | (download)

chat/chat.8 | 5 3 + 2 - 0 !
1 file changed, 3 insertions(+), 2 deletions(-)

---
fix_linkpidfile | (download)

pppd/main.c | 3 1 + 2 - 0 !
1 file changed, 1 insertion(+), 2 deletions(-)

 bug#284382: ppp: linkpidfile is not created upon detachment
pppdump_use_zlib | (download)

pppdump/Makefile.linux | 28 26 + 2 - 0 !
1 file changed, 26 insertions(+), 2 deletions(-)

---
pppoatm_resolver_light | (download)

pppd/plugins/pppoatm/Makefile.linux | 4 4 + 0 - 0 !
pppd/plugins/pppoatm/pppoatm.c | 4 4 + 0 - 0 !
pppd/plugins/pppoatm/text2atm.c | 4 4 + 0 - 0 !
3 files changed, 12 insertions(+)

---
pppoatm_cleanup | (download)

pppd/plugins/pppoatm/pppoatm.c | 23 13 + 10 - 0 !
1 file changed, 13 insertions(+), 10 deletions(-)

---
pppoe_noads | (download)

pppd/plugins/rp-pppoe/plugin.c | 3 0 + 3 - 0 !
1 file changed, 3 deletions(-)

---
readable_connerrs | (download)

pppd/main.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

---
radius config.c unkown typo | (download)

pppd/plugins/radius/config.c | 6 3 + 3 - 0 !
1 file changed, 3 insertions(+), 3 deletions(-)

 correct unkown => unknown typo
pr 28 pppoe custom host uniq tag.patch | (download)

pppd/plugins/rp-pppoe/common.c | 14 5 + 9 - 0 !
pppd/plugins/rp-pppoe/discovery.c | 51 20 + 31 - 0 !
pppd/plugins/rp-pppoe/plugin.c | 7 6 + 1 - 0 !
pppd/plugins/rp-pppoe/pppoe-discovery.c | 38 25 + 13 - 0 !
pppd/plugins/rp-pppoe/pppoe.h | 31 30 + 1 - 0 !
5 files changed, 86 insertions(+), 55 deletions(-)

 [patch] pppoe: custom host-uniq tag
011_scripts_redialer.diff | (download)

scripts/redialer | 133 53 + 80 - 0 !
1 file changed, 53 insertions(+), 80 deletions(-)

---
cifdefroute.dif | (download)

pppd/ipcp.c | 45 40 + 5 - 0 !
pppd/ipcp.h | 1 1 + 0 - 0 !
pppd/pppd.8 | 12 11 + 1 - 0 !
pppd/pppd.h | 4 4 + 0 - 0 !
pppd/sys-linux.c | 82 67 + 15 - 0 !
5 files changed, 123 insertions(+), 21 deletions(-)

 add replacedefaultroute option

Adds an option to pppd to control whether to replace existing default routes
when using the 'defaultroute' option.

If defaultroute and replacedefaultroute are both set, pppd replaces an existing
default route with the new default route. The old default route is restored when
the connection is taken down.

ppp 2.3.11 oedod.dif | (download)

pppd/demand.c | 99 98 + 1 - 0 !
pppd/ipcp.c | 2 1 + 1 - 0 !
pppd/ipv6cp.c | 2 1 + 1 - 0 !
pppd/pppd.h | 2 1 + 1 - 0 !
4 files changed, 101 insertions(+), 4 deletions(-)

---
radius_mtu | (download)

pppd/plugins/radius/radius.c | 3 3 + 0 - 0 !
1 file changed, 3 insertions(+)

 radius plugin does not set mtu on ppp interface
Date: Mon, 22 Jan 2007 12:36:59 +0000 (GMT)

Full_Name: Alexander Klepikov
Version: 2.4.3
OS: rhl 7.3 (2.4.20-28.7bigmem)
018_ip up_option.diff | (download)

pppd/ipcp.c | 8 4 + 4 - 0 !
pppd/main.c | 3 3 + 0 - 0 !
pppd/options.c | 9 9 + 0 - 0 !
pppd/pppd.h | 2 2 + 0 - 0 !
4 files changed, 18 insertions(+), 4 deletions(-)

---
ppp 2.4.2 stripMSdomain | (download)

pppd/chap-new.c | 11 11 + 0 - 0 !
1 file changed, 11 insertions(+)

---
setenv_call_file | (download)

pppd/options.c | 1 1 + 0 - 0 !
pppd/pppd.8 | 3 3 + 0 - 0 !
2 files changed, 4 insertions(+)

---
ipv6 accept remote | (download)

pppd/ipv6cp.c | 5 4 + 1 - 0 !
pppd/ipv6cp.h | 3 2 + 1 - 0 !
pppd/pppd.8 | 5 5 + 0 - 0 !
3 files changed, 11 insertions(+), 2 deletions(-)

---
ppp 2.4.4 strncatfix.patch | (download)

pppd/plugins/radius/clientid.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 fix a potential buffer overflow in clientid.c:rc_map2id()

This fixes the following compile-time warning when building with
-D_FORTIFY_SOURCE=2:

In file included from /usr/include/string.h:638:0,
                 from ./includes.h:26,
                 from clientid.c:12:
In function 'strncat',
    inlined from 'rc_map2id' at clientid.c:113:9:
/usr/include/i386-linux-gnu/bits/string3.h:150:3: warning: call to
__builtin___strncat_chk might overflow destination buffer [enabled by default]
   return __builtin___strncat_chk (__dest, __src, __len, __bos (__dest));
   ^

010_scripts_README.diff | (download)

scripts/README | 14 14 + 0 - 0 !
1 file changed, 14 insertions(+)

---
no_crypt_hack | (download)

pppd/Makefile.linux | 4 4 + 0 - 0 !
pppd/auth.c | 2 2 + 0 - 0 !
pppd/session.c | 2 2 + 0 - 0 !
3 files changed, 8 insertions(+)

---
resolv.conf_no_log | (download)

pppd/ipcp.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

---
zzz_config | (download)

pppd/Makefile.linux | 6 2 + 4 - 0 !
pppd/pathnames.h | 2 1 + 1 - 0 !
pppd/pppd.h | 2 1 + 1 - 0 !
pppdump/Makefile.linux | 4 2 + 2 - 0 !
4 files changed, 6 insertions(+), 8 deletions(-)

---
secure card interpreter fix | (download)

scripts/secure-card | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 change path to expect in secure-card example script

This fixes the lintian warning:
I: ppp: example-wrong-path-for-interpreter
  usr/share/doc/ppp/examples/scripts/secure-card
  (#!/usr/local/bin/expect != /usr/bin/expect)

rc_mksid no buffer overflow | (download)

pppd/plugins/radius/util.c | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 fix buffer overflow in rc_mksid()
 rc_mksid converts the PID of pppd to hex to generate a pseudo-unique string.
 .
 If the process id is bigger than 65535 (FFFF), its hex representation will be
 longer than 4 characters, resulting in a buffer overflow.
 .
 The bug can be exploited to cause a remote DoS.
 .
pppd soname hack.patch | (download)

pppd/Makefile.linux | 5 4 + 1 - 0 !
1 file changed, 4 insertions(+), 1 deletion(-)

 add a soname to the pppd binary
 This hack inserts a SONAME into the pppd binary, which allows us to
 run dpkg-gensymbols/dh_makeshlibs over the resulting binary. This is
 useful so that we can use Debian's standard build infrastructure to
 help track the ppp binary's ABI, which is used by plugins.
eaptls mppe.patch | (download)

README.eap-tls | 291 291 + 0 - 0 !
etc.ppp/eaptls-client | 10 10 + 0 - 0 !
etc.ppp/eaptls-server | 11 11 + 0 - 0 !
etc.ppp/openssl.cnf | 14 14 + 0 - 0 !
linux/Makefile.top | 6 5 + 1 - 0 !
pppd/Makefile.linux | 12 12 + 0 - 0 !
pppd/auth.c | 413 411 + 2 - 0 !
pppd/ccp.c | 20 19 + 1 - 0 !
pppd/chap-md5.c | 4 4 + 0 - 0 !
pppd/eap-tls.c | 1383 1383 + 0 - 0 !
pppd/eap-tls.h | 107 107 + 0 - 0 !
pppd/eap.c | 463 461 + 2 - 0 !
pppd/eap.h | 32 31 + 1 - 0 !
pppd/md5.c | 4 4 + 0 - 0 !
pppd/md5.h | 3 3 + 0 - 0 !
pppd/pathnames.h | 7 7 + 0 - 0 !
pppd/plugins/Makefile.linux | 3 3 + 0 - 0 !
pppd/plugins/passprompt.c | 3 3 + 0 - 0 !
pppd/plugins/passwordfd.c | 4 4 + 0 - 0 !
pppd/pppd.8 | 33 33 + 0 - 0 !
pppd/pppd.h | 9 9 + 0 - 0 !
21 files changed, 2825 insertions(+), 7 deletions(-)

 eap-tls authentication support for ppp
replace vendored hash functions.patch | (download)

pppd/Makefile.linux | 25 9 + 16 - 0 !
pppd/chap-md5.c | 2 1 + 1 - 0 !
pppd/chap_ms.c | 40 14 + 26 - 0 !
pppd/eap.c | 2 1 + 1 - 0 !
pppd/md4.c | 299 0 + 299 - 0 !
pppd/md4.h | 64 0 + 64 - 0 !
pppd/md5.c | 311 0 + 311 - 0 !
pppd/md5.h | 68 0 + 68 - 0 !
pppd/plugins/radius/md5.c | 2 1 + 1 - 0 !
pppd/plugins/radius/radius.c | 2 1 + 1 - 0 !
pppd/plugins/winbind.c | 2 1 + 1 - 0 !
pppd/sha1.c | 170 0 + 170 - 0 !
pppd/sha1.h | 31 0 + 31 - 0 !
13 files changed, 28 insertions(+), 990 deletions(-)

 replace vendored hash functions with libcrypto
Bug-Debian: https://bugs.debian.org/826625