Fedora EPEL 4 updates-testing report
updates at fedoraproject.org
updates at fedoraproject.org
Thu Jan 20 06:31:30 UTC 2011
The following Fedora EPEL 4 Security updates need testing:
https://admin.fedoraproject.org/updates/myproxy-5.3-1.el4
https://admin.fedoraproject.org/updates/proftpd-1.3.3d-1.el4
The following builds have been pushed to Fedora EPEL 4 updates-testing
perl-CDB_File-0.96-2.el4
perl-Test-NoWarnings-0.083-1.el4
proftpd-1.3.3d-1.el4
Details about builds:
================================================================================
perl-CDB_File-0.96-2.el4 (FEDORA-EPEL-2011-0101)
Perl extension for access to cdb databases
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #656084 - Review Request: perl-CDB_File - Perl extension for access to cdb databases
https://bugzilla.redhat.com/show_bug.cgi?id=656084
--------------------------------------------------------------------------------
================================================================================
perl-Test-NoWarnings-0.083-1.el4 (FEDORA-EPEL-2011-0099)
Make sure you didn't emit any warnings while testing
--------------------------------------------------------------------------------
Update Information:
This is the first EPEL-4 release of perl-Test-NoWarnings.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #188378 - Review Request: perl-Test-NoWarnings
https://bugzilla.redhat.com/show_bug.cgi?id=188378
--------------------------------------------------------------------------------
================================================================================
proftpd-1.3.3d-1.el4 (FEDORA-EPEL-2011-0093)
Flexible, stable and highly-configurable FTP server
--------------------------------------------------------------------------------
Update Information:
This is an update to the current upstream maintenance release, which addresses a security issue that could affect users of the mod_sql module (not enabled by default).
* A heap-based buffer overflow flaw was found in the way ProFTPD FTP server prepared SQL queries for certain usernames, when the mod_sql module was enabled. A remote, unauthenticated attacker could use this flaw to cause the proftpd daemon to crash or, potentially, to execute arbitrary code with the privileges of the user running 'proftpd' via a specially-crafted username, provided in the authentication dialog.
The update also fixes a CPU spike when handling .ftpaccess files, and handling of SFTP uploads when compression is used.
--------------------------------------------------------------------------------
ChangeLog:
* Wed Jan 19 2011 Paul Howarth <paul at city-fan.org> 1.3.3d-1
- Updated to 1.3.3d
- Fixed sql_prepare_where() buffer overflow (bug 3536, CVE-2010-4652)
- Fixed CPU spike when handling .ftpaccess files
- Fixed handling of SFTP uploads when compression is used
- Add Default-Stop LSB keyword in initscript (for runlevels 0, 1, and 6)
- Fix typos in config file and initscript
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #670170 - CVE-2010-4652 ProFTPD (mod_sql): Heap-based buffer overflow by processing certain usernames, when mod_sql module enabled
https://bugzilla.redhat.com/show_bug.cgi?id=670170
--------------------------------------------------------------------------------
More information about the epel-devel-list
mailing list