Bug 681667 (CVE-2011-0762)
Summary: | CVE-2011-0762 vsftpd: remote DoS via crafted glob pattern | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> | ||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||
Status: | CLOSED ERRATA | QA Contact: | |||||||
Severity: | high | Docs Contact: | |||||||
Priority: | high | ||||||||
Version: | unspecified | CC: | amarecek, davidyangyi, jlieskov, jskala, nagy.martin, wnefal+redhatbugzilla | ||||||
Target Milestone: | --- | Keywords: | Security | ||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2012-08-30 10:55:01 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | 681891, 681892, 681893, 681894, 681920, 681935 | ||||||||
Bug Blocks: | |||||||||
Attachments: |
|
Description
Vincent Danen
2011-03-02 21:37:24 UTC
Created attachment 481947 [details]
relevant bits extracted from 2.3.2/2.3.3 diff
This should be the relevant bits from the diff of upstream 2.3.2 and 2.3.3 versions, and should correct the flaw.
(In reply to comment #1) > This should be the relevant bits from the diff of upstream 2.3.2 and 2.3.3 > versions, and should correct the flaw. Looking at the 2.3.3 -> 2.3.4 diff, described in the changelog as: - Fix compile. Extreme suckage. Failed compile is related to this fix, so 2.3.2 -> 2.3.4 diff is what we should be using. Created attachment 482013 [details]
2.3.2 -> 2.3.4 changes relevant to this issue.
Created vsftpd tracking bugs for this issue Affects: fedora-all [bug 681935] This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2011:0337 https://rhn.redhat.com/errata/RHSA-2011-0337.html which version of vsftpd fix the vsf_filename_passes_filter Vulnerabilities issue in redhat release? (In reply to comment #16) > which version of vsftpd fix the vsf_filename_passes_filter Vulnerabilities > issue in redhat release? As noted in comment c#15, the CVE-2011-0762 was corrected in Red Hat Enterprise Linux 4, 5, and 6 via RHSA-2011:0337 advisory. See https://rhn.redhat.com/errata/RHSA-2011-0337.html for concrete package versions for particular system / release. Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team |