stable

proftpd-1.3.3g-6.el5

FEDORA-EPEL-2016-bafacd5846 created by pghmcfc 8 years ago for Fedora EPEL 5

This update fixes issues with selection of inappropriate DH parameters, which could lead to encrypted traffic being more easily decrypted than it should be.

The update also adds support for specifying TLSv1.1 and TLSv1.2, and fixes an SUID/SGID directory permission setting regression introduced with an earlier update addressing CVE-2012-6095.

This update has been submitted for testing by pghmcfc.

8 years ago

This update has been pushed to testing.

8 years ago

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

8 years ago

pghmcfc edited this update.

New build(s):

  • proftpd-1.3.3g-6.el5

Removed build(s):

  • proftpd-1.3.3g-5.el5
8 years ago

This update has been submitted for testing by pghmcfc.

8 years ago

This update has been pushed to testing.

8 years ago

This update has been submitted for stable by pghmcfc.

8 years ago

This update has been pushed to stable.

8 years ago

Please login to add feedback.

Metadata
Type
security
Severity
low
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
8 years ago
in testing
8 years ago
in stable
8 years ago
modified
8 years ago
BZ#1281493 Unable to use TLSv1.1 or TLSv1.2 protocol when TLSProtocol is set to TLSv1
0
0
BZ#1297264 Backport fix for handling/propagation of SUID/SGID bits from parent directory
0
0
BZ#1317420 CVE-2016-3125 proftpd: usage of 1024 bit DH key even with manual parameters set
0
0
BZ#1317422 CVE-2016-3125 proftpd: usage of 1024 bit DH key even with manual parameters set [epel-all]
0
0

Automated Test Results