From 27c0649129f30506bcb71210f6a18a9f55de056cdc250b77ed31eba5575a2f8c Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Aeneas=20Jai=C3=9Fle?= Date: Fri, 13 Nov 2015 23:24:28 +0000 Subject: [PATCH] Accepting request 344304 from home:aeneas_jaissle:branches:network OBS-URL: https://build.opensuse.org/request/show/344304 OBS-URL: https://build.opensuse.org/package/show/network/ppp?expand=0&rev=34 --- CVE-2015-3310 => ppp-CVE-2015-3310.patch | 0 ppp.changes | 3 ++- ppp.spec | 3 ++- 3 files changed, 4 insertions(+), 2 deletions(-) rename CVE-2015-3310 => ppp-CVE-2015-3310.patch (100%) diff --git a/CVE-2015-3310 b/ppp-CVE-2015-3310.patch similarity index 100% rename from CVE-2015-3310 rename to ppp-CVE-2015-3310.patch diff --git a/ppp.changes b/ppp.changes index 4dda2a7..d5ce16e 100644 --- a/ppp.changes +++ b/ppp.changes @@ -1,7 +1,8 @@ ------------------------------------------------------------------- Fri Nov 13 15:26:03 UTC 2015 - max@suse.com -- bnc#927841, CVE-2015-3310: Fix buffer overflow in radius +- Added ppp-CVE-2015-3310.patch: + Fix for bnc#927841, CVE-2015-3310: Fix buffer overflow in radius plug-in's rc_mksid(). ------------------------------------------------------------------- diff --git a/ppp.spec b/ppp.spec index 101fffe..222b779 100644 --- a/ppp.spec +++ b/ppp.spec @@ -69,7 +69,8 @@ Patch19: ppp-2.4.4-strncatfix.patch Patch21: ppp-2.4.6-lib64.patch Patch22: ppp-2.4.4-var_run_resolv_conf.patch Patch23: ppp-send-padt.patch -Patch24: CVE-2015-3310 +# PATCH-FIX-UPSTREAM -- Patch for CVE-2015-3310 +Patch24: ppp-CVE-2015-3310.patch %description The ppp package contains the PPP (Point-to-Point Protocol) daemon,