Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 11 Feb 2009 11:16:14 -0800 (PST)
From: TJ Saunders <>
To: <>
Subject: Re: CVE request for proftpd

> >As discussed there, this is a duplicate of an earlier bug:
> >
> >
> >
> >and has been fixed in ProFTPD 1.3.2rc3 and later.
> Oh, forgot to ask.  It looks like this would have been introduced in
> 1.3.1.  Is that correct?  So the affected versions would be
> 1.3.1 to 1.3.2rc2.

That's correct.

> Also, as I was looking at the Gentoo report, I noticed bug #3173 which
> likely also needs a CVE name (for the "encoding-dependent SQL injection
> vulnerability").

Yes; I was just about to note the same thing. =)



   The split in you is clear.  There is a part of you that knows what it
   should do, and a part that does what it feels like doing.
   	-John Cantwell Kiley

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ