Source: proftpd-dfsg Version: 1.3.6b-1 Severity: important Tags: security upstream Forwarded: https://github.com/proftpd/proftpd/issues/861 Control: found -1 1.3.6-4+deb10u2 Control: found -1 1.3.5b-4+deb9u2 Control: found -1 1.3.5b-4+deb9u1
Hi, The following vulnerability was published for proftpd-dfsg. CVE-2019-19269[0]: | An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. A | dereference of a NULL pointer may occur. This pointer is returned by | the OpenSSL sk_X509_REVOKED_value() function when encountering an | empty CRL installed by a system administrator. The dereference occurs | when validating the certificate of a client connecting to the server | in a TLS client/server mutual-authentication setup. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2019-19269 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19269 [1] https://github.com/proftpd/proftpd/issues/861 Regards, Salvatore