openbsd-ports/net/icecast/patches/patch-conf_icecast_minimal_xml_in
gonzalo 31f09f54a6 Update for Icecast to 2.3.3:
* Improved HTTPS cipher handling and added support for chained certificates.
* Allow the source password to be undefined. There was a corner case,
  where a default password would have taken effect. It would require the
  admin to remove the 'source-password' from the icecast config to take
  effect. Default configs ship with the password set, so this
  vulnerability doesn't trigger there.
* Prevent error log injection of control characters by substituting
  non-alphanumeric characters with a '.' (CVE-2011-4612). Injection
  attempts can be identified via access.log, as that stores URL encoded
  requests. Investigation if further logging code needs to have
  sanitized output is ongoing.

Tested on amd64.

Reads fine aja@
2012-09-01 17:35:54 +00:00

30 lines
1009 B
Plaintext

$OpenBSD: patch-conf_icecast_minimal_xml_in,v 1.2 2012/09/01 17:35:54 gonzalo Exp $
--- conf/icecast_minimal.xml.in.orig Mon Jun 11 13:45:19 2012
+++ conf/icecast_minimal.xml.in Fri Aug 31 11:26:58 2012
@@ -22,9 +22,10 @@
</listen-socket>
<fileserve>1</fileserve>
<paths>
- <logdir>@localstatedir@/log/@PACKAGE@</logdir>
- <webroot>@pkgdatadir@/web</webroot>
- <adminroot>@pkgdatadir@/admin</adminroot>
+ <basedir>/var/icecast</basedir>
+ <logdir>/log</logdir>
+ <webroot>/web</webroot>
+ <adminroot>/admin</adminroot>
<alias source="/" destination="/status.xsl"/>
</paths>
<logging>
@@ -32,4 +33,11 @@
<errorlog>error.log</errorlog>
<loglevel>3</loglevel> <!-- 4 Debug, 3 Info, 2 Warn, 1 Error -->
</logging>
+ <security>
+ <chroot>1</chroot>
+ <changeowner>
+ <user>_icecast</user>
+ <group>_icecast</group>
+ </changeowner>
+ </security>
</icecast>