[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2115-1] proftpd-dfsg security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : proftpd-dfsg
Version        : 1.3.5e+r1.3.5-2+deb8u6
CVE ID         : CVE-2020-9273

It was discovered that there was a a use-after-free vulnerability in
in the proftpd-dfsg FTP server.

Exploitation of this vulnerability within the memory pool handling
could have allowed a remote attacker to execute arbitrary code on the
affected system.

For Debian 8 "Jessie", this issue has been fixed in proftpd-dfsg version
1.3.5e+r1.3.5-2+deb8u6.

We recommend that you upgrade your proftpd-dfsg packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Regards,

- -- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

-----BEGIN PGP SIGNATURE-----
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=2NBy
-----END PGP SIGNATURE-----


Reply to: