From owner-freebsd-ports-bugs@FreeBSD.ORG Thu May 19 15:50:08 2005 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 9589016A4CF for ; Thu, 19 May 2005 15:50:08 +0000 (GMT) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id B15BB43D73 for ; Thu, 19 May 2005 15:50:07 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.3/8.13.3) with ESMTP id j4JFo7Tq032650 for ; Thu, 19 May 2005 15:50:07 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.3/8.13.1/Submit) id j4JFo7SA032649; Thu, 19 May 2005 15:50:07 GMT (envelope-from gnats) Resent-Date: Thu, 19 May 2005 15:50:07 GMT Resent-Message-Id: <200505191550.j4JFo7SA032649@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Matthias Andree Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id D7D7416A4CE; Thu, 19 May 2005 15:43:34 +0000 (GMT) Received: from unimail.uni-dortmund.de (mx1.HRZ.Uni-Dortmund.DE [129.217.128.51]) by mx1.FreeBSD.org (Postfix) with ESMTP id 6A28943DA1; Thu, 19 May 2005 15:43:33 +0000 (GMT) (envelope-from matthias.andree@gmx.de) Received: from m2a2.myip.org (yr5xyk5z07jhvlqg@p50914C8B.dip.t-dialin.net [80.145.76.139]) (authenticated bits=0)j4JFh34R010715; Thu, 19 May 2005 17:43:09 +0200 (CEST) Received: by merlin.emma.line.org (Postfix, from userid 1001) id BC9771B29B; Thu, 19 May 2005 17:43:02 +0200 (CEST) Message-Id: <20050519154302.BC9771B29B@merlin.emma.line.org> Date: Thu, 19 May 2005 17:43:02 +0200 (CEST) From: Matthias Andree To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 cc: Jaroslav Klaus cc: vs@FreeBSD.org Subject: ports/81267: [MAINTAINER] security/openvpn: plug socket (file descriptor) leak X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 19 May 2005 15:50:08 -0000 >Number: 81267 >Category: ports >Synopsis: [MAINTAINER] security/openvpn: plug socket (file descriptor) leak >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: maintainer-update >Submitter-Id: current-users >Arrival-Date: Thu May 19 15:50:06 GMT 2005 >Closed-Date: >Last-Modified: >Originator: Matthias Andree >Release: FreeBSD 5.4-STABLE i386 >Organization: >Environment: System: FreeBSD merlin.emma.line.org 5.4-STABLE FreeBSD 5.4-STABLE #29: Thu May 5 11:41:16 CEST >Description: Plug socket (file descriptor) leak. Submitted by: Jaroslav Klaus Added file(s): - files/patch-route.c Generated with FreeBSD Port Tools 0.63 >How-To-Repeat: >Fix: --- openvpn-2.0_1.patch begins here --- diff -ruN --exclude=CVS /usr/ports/security/openvpn/Makefile /root/ports/security/openvpn/Makefile --- /usr/ports/security/openvpn/Makefile Sat Apr 23 11:29:38 2005 +++ /root/ports/security/openvpn/Makefile Thu May 19 17:18:56 2005 @@ -7,6 +7,7 @@ PORTNAME= openvpn DISTVERSION= 2.0 +PORTREVISION= 1 CATEGORIES= security MASTER_SITES= http://openvpn.net/release/ diff -ruN --exclude=CVS /usr/ports/security/openvpn/files/patch-route.c /root/ports/security/openvpn/files/patch-route.c --- /usr/ports/security/openvpn/files/patch-route.c Thu Jan 1 01:00:00 1970 +++ /root/ports/security/openvpn/files/patch-route.c Thu May 19 17:14:10 2005 @@ -0,0 +1,50 @@ +--- route.c.orig Mon Apr 11 05:43:56 2005 ++++ route.c Mon May 16 21:13:41 2005 +@@ -1380,6 +1380,7 @@ + { + warn("writing to routing socket"); + gc_free (&gc); ++ close(s); + return false; + } + +@@ -1387,6 +1388,7 @@ + l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg)); + } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid)); + ++ close(s); + + rtm_aux = &rtm; + +@@ -1535,6 +1537,7 @@ + { + msg (M_WARN, "ROUTE: problem writing to routing socket"); + gc_free (&gc); ++ close(s); + return false; + } + +@@ -1542,6 +1545,7 @@ + l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg)); + } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid)); + ++ close(s); + + rtm_aux = &rtm; + +@@ -1690,6 +1694,7 @@ + { + warn("writing to routing socket"); + gc_free (&gc); ++ close(s); + return false; + } + +@@ -1697,6 +1702,7 @@ + l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg)); + } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid)); + ++ close(s); + + rtm_aux = &rtm; + --- openvpn-2.0_1.patch ends here --- >Release-Note: >Audit-Trail: >Unformatted: