Yeah,
upstream releases rarely (2015 was the last) and while [1] is public the source 
[2] is behind some login it seems. 

There also is a longer list of accrued bugs in Debian [3].

The particular issue reported here these days is fixed in [4][5][6] but
I've not seen TLSv1.3 there.

Maybe more of [7] is worth a check to be included and vsftpd worth of
some attention.

[1]: https://security.appspot.com/vsftpd.html
[2]: https://security.appspot.com/vsftpd.html#docs
[3]: https://bugs.debian.org/cgi-bin/pkgreport.cgi?repeatmerged=yes&src=vsftpd
[4]: 
https://src.fedoraproject.org/rpms/vsftpd/blob/master/f/0033-Introduce-TLSv1.1-and-TLSv1.2-options.patch
[5]: 
https://src.fedoraproject.org/rpms/vsftpd/blob/master/f/0042-When-handling-FEAT-command-check-ssl_tlsv1_1-and-ssl.patch
[6]: 
https://src.fedoraproject.org/rpms/vsftpd/blob/master/f/0043-Enable-only-TLSv1.2-by-default.patch
[7]: https://src.fedoraproject.org/rpms/vsftpd/tree/master

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1804430

Title:
  Current vsftpd builds are still lacking ssl_tlsv1_[123] options

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/vsftpd/+bug/1804430/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to