On 2/22/20 5:52 PM, Salvatore Bonaccorso wrote:
> On Fri, Feb 21, 2020 at 10:07:42PM +0100, Hilmar Preusse wrote:

Hi Salvatore,

>> Package: proftpd-basic
>> Version: 1.3.6-4+deb10u3
>> Severity: important
>> Tags: upstream
>>
>> This is to track CVE-2020-9273.
>>
>> I'm not 100% sure if jessie is affected too. At least the
>> CVE does not report it.
> 
> While beeing here at snowcamp I worked on updating for this CVE,
> attached is the result for buster which is only applying basically
> unchanged the upstream commit.
> 
The fix for this issue (+ patch for two other issues) is already in the
buster branch on salsa. I planned to upload that ASAP. Not sure if it
will still happen this week.

> Will try to do next the stretch-security one. But if you have an
> idea how to reach the reporter please let me/us know.
> 
Yes, that would be great. The patch for 1.3.6 does not apply cleanly to
the 1.3.5b from Debian stretch.

Thanks,
  Hilmar
-- 
sigfault
#206401 http://counter.li.org

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to