Bug 670170 (CVE-2010-4652)
Summary: | CVE-2010-4652 ProFTPD (mod_sql): Heap-based buffer overflow by processing certain usernames, when mod_sql module enabled | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | matthias, paul |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2011-06-29 11:46:17 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Bug Depends On: | 670172 | ||
Bug Blocks: |
Description
Jan Lieskovsky
2011-01-17 12:37:02 UTC
This issue affects the versions of the proftpd package, as shipped with Fedora release of 13 and 14. This issue affects the versions of the proftpd package, as present within EPEL-4 and EPEL-5 repositories. Please rebase to latest (1.3.3d) version. Created proftpd tracking bugs for this issue Affects: fedora-all [bug 670172] Do these Security Response bugs ever get closed? Hi Paul, they are closed when the particular issue got addressed in all affected versions. Which seems to be the case of this issue already. Thank you for the updates. Closing. (In reply to comment #3) > Do these Security Response bugs ever get closed? |