Fedora EPEL 4 updates-testing report

updates at fedoraproject.org updates at fedoraproject.org
Thu Jan 20 06:31:30 UTC 2011


The following Fedora EPEL 4 Security updates need testing:

    https://admin.fedoraproject.org/updates/myproxy-5.3-1.el4
    https://admin.fedoraproject.org/updates/proftpd-1.3.3d-1.el4


The following builds have been pushed to Fedora EPEL 4 updates-testing

    perl-CDB_File-0.96-2.el4
    perl-Test-NoWarnings-0.083-1.el4
    proftpd-1.3.3d-1.el4

Details about builds:


================================================================================
 perl-CDB_File-0.96-2.el4 (FEDORA-EPEL-2011-0101)
 Perl extension for access to cdb databases
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #656084 - Review Request: perl-CDB_File - Perl extension for access to cdb databases
        https://bugzilla.redhat.com/show_bug.cgi?id=656084
--------------------------------------------------------------------------------


================================================================================
 perl-Test-NoWarnings-0.083-1.el4 (FEDORA-EPEL-2011-0099)
 Make sure you didn't emit any warnings while testing
--------------------------------------------------------------------------------
Update Information:

This is the first EPEL-4 release of perl-Test-NoWarnings.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #188378 - Review Request: perl-Test-NoWarnings
        https://bugzilla.redhat.com/show_bug.cgi?id=188378
--------------------------------------------------------------------------------


================================================================================
 proftpd-1.3.3d-1.el4 (FEDORA-EPEL-2011-0093)
 Flexible, stable and highly-configurable FTP server
--------------------------------------------------------------------------------
Update Information:

This is an update to the current upstream maintenance release, which addresses a security issue that could affect users of the mod_sql module (not enabled by default).

* A heap-based buffer overflow flaw was found in the way ProFTPD FTP server prepared SQL queries for certain usernames, when the mod_sql module was enabled. A remote, unauthenticated attacker could use this flaw to cause the proftpd daemon to crash or, potentially, to execute arbitrary code with the privileges of the user running 'proftpd' via a specially-crafted username, provided in the authentication dialog.

The update also fixes a CPU spike when handling .ftpaccess files, and handling of SFTP uploads when compression is used.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Jan 19 2011 Paul Howarth <paul at city-fan.org> 1.3.3d-1
- Updated to 1.3.3d
  - Fixed sql_prepare_where() buffer overflow (bug 3536, CVE-2010-4652)
  - Fixed CPU spike when handling .ftpaccess files
  - Fixed handling of SFTP uploads when compression is used
- Add Default-Stop LSB keyword in initscript (for runlevels 0, 1, and 6)
- Fix typos in config file and initscript
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #670170 - CVE-2010-4652 ProFTPD (mod_sql): Heap-based buffer overflow by processing certain usernames, when mod_sql module enabled
        https://bugzilla.redhat.com/show_bug.cgi?id=670170
--------------------------------------------------------------------------------





More information about the epel-devel-list mailing list