stable

proftpd-1.3.3g-15.el6

FEDORA-EPEL-2020-83b080a694 created by pghmcfc 4 years ago for Fedora EPEL 6

This update fixes a NULL pointer dereference in SCP options processing. An authenticated remote attacker could issue invalid SCP commands, possibly resulting in a Denial of Service condition.

Note: the sftp/scp server is not enabled by the default configuration.

This update has been submitted for testing by pghmcfc.

4 years ago

This update's test gating status has been changed to 'ignored'.

4 years ago

This update's test gating status has been changed to 'waiting'.

4 years ago

This update's test gating status has been changed to 'ignored'.

4 years ago

This update has been pushed to testing.

4 years ago

This update can be pushed to stable now if the maintainer wishes

4 years ago

This update has been submitted for stable by bodhi.

4 years ago

This update has been pushed to stable.

4 years ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
0
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-1
Stable by Karma
2
Stable by Time
14 days
Dates
submitted
4 years ago
in testing
4 years ago
in stable
4 years ago
BZ#1878869 proftpd: NULL pointer dereference via invalid SCP command leads to DoS
0
0
BZ#1878870 proftpd: NULL pointer dereference via invalid SCP command leads to DoS [epel-all]
0
0

Automated Test Results