ports/142454: [patch] sysutils/fusefs-curlftpfs core dump on permission denied

Aragon Gouveia aragon at phat.za.net
Fri Jan 8 01:20:10 UTC 2010


>Number:         142454
>Category:       ports
>Synopsis:       [patch] sysutils/fusefs-curlftpfs core dump on permission denied
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Fri Jan 08 01:20:09 UTC 2010
>Closed-Date:
>Last-Modified:
>Originator:     Aragon Gouveia
>Release:        8.0-STABLE
>Organization:
>Environment:
FreeBSD fuzz.geek.sh 8.0-STABLE FreeBSD 8.0-STABLE #2: Sat Dec  5 11:43:56 SAST 2009     toor at fuzz.geek.sh:/usr/obj/usr/src/sys/FUZZ  amd64

>Description:
There is a bug with curlftpfs which causes it to core dump when an FTP server rejects a file retrieval operation with permission denied.  It is reported upstream here:

http://code.google.com/p/curlftpfs/issues/detail?id=2

I've updated that report with a patch which fixes it for me.  Please could you consider integrating the patch into our port until upstream creates a new release with the fix.

Patch attached.

Thanks.

>How-To-Repeat:

>Fix:


Patch attached with submission follows:

--- ftpfs.c.orig	2008-04-30 01:05:47.000000000 +0200
+++ ftpfs.c	2010-01-08 03:04:05.000000000 +0200
@@ -611,10 +611,12 @@ static void free_ftpfs_file(struct ftpfs
     curl_easy_cleanup(fh->write_conn);
   g_free(fh->full_path);
   g_free(fh->open_path);
-  sem_destroy(&fh->data_avail);
-  sem_destroy(&fh->data_need);
-  sem_destroy(&fh->data_written);
-  sem_destroy(&fh->ready);
+  if (fh->data_avail) {
+    sem_destroy(&fh->data_avail);
+    sem_destroy(&fh->data_need);
+    sem_destroy(&fh->data_written);
+    sem_destroy(&fh->ready);
+  }
   free(fh);
 }
 


>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list