stable

proftpd-1.3.3g-15.el6

FEDORA-EPEL-2020-83b080a694 created by pghmcfc 3 years ago for Fedora EPEL 6

This update fixes a NULL pointer dereference in SCP options processing. An authenticated remote attacker could issue invalid SCP commands, possibly resulting in a Denial of Service condition.

Note: the sftp/scp server is not enabled by the default configuration.

This update has been submitted for testing by pghmcfc.

3 years ago

This update's test gating status has been changed to 'ignored'.

3 years ago

This update's test gating status has been changed to 'waiting'.

3 years ago

This update's test gating status has been changed to 'ignored'.

3 years ago

This update has been pushed to testing.

3 years ago

This update can be pushed to stable now if the maintainer wishes

3 years ago

This update has been submitted for stable by bodhi.

3 years ago

This update has been pushed to stable.

3 years ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-1
Stable by Karma
2
Stable by Time
14 days
Dates
submitted
3 years ago
in testing
3 years ago
in stable
3 years ago
BZ#1878869 proftpd: NULL pointer dereference via invalid SCP command leads to DoS
0
0
BZ#1878870 proftpd: NULL pointer dereference via invalid SCP command leads to DoS [epel-all]
0
0

Automated Test Results