-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : proftpd-dfsg Version : 1.3.5e+r1.3.5-2+deb8u6 CVE ID : CVE-2020-9273
It was discovered that there was a a use-after-free vulnerability in in the proftpd-dfsg FTP server. Exploitation of this vulnerability within the memory pool handling could have allowed a remote attacker to execute arbitrary code on the affected system. For Debian 8 "Jessie", this issue has been fixed in proftpd-dfsg version 1.3.5e+r1.3.5-2+deb8u6. We recommend that you upgrade your proftpd-dfsg packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS Regards, - -- ,''`. : :' : Chris Lamb `. `'` [email protected] / chris-lamb.co.uk `- -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAl5QPe8ACgkQHpU+J9Qx HlgNGA//U9OXGI0s0LWdnColuEnXMoDZVT9ysA3KGk+Yp9YKka45sldimSYKumgK 6v4THeog8qmBJJBkezSQYYzi1GEE6vCUxBXUnVGw+CRWgHZ7TT8q3cwSO1Q/E1tq RtrqFaCrgNhL7BRksdq+F74hIXmDa2KpAADvMJ+muU5Mu2WKRdVgk8XOQPJkgx3+ YN65Zupcv4imEL5fuXx6tYsq8U8Twl5RMhuL5VQHpz9ekkVAUTBhGH1/jWMOtUiE 8FCFTrDpzy2aJBR8waSlH6TyBr4mcMLW0rE44oi373QEXrX3WG7nF8dK6lDco7jc Itg2dbGatNTaq/ALfhY13ZM7A+bCvjq7e9x/dCkbRSrQRTzdXxyF2yn7ATvi4SMn XPYbq69tRnpCJygVoBJwaUKNqJFFvbD+LCEAUjwqnJ1CzqYqWS4Qb+cLc8mpMhPC mvtyplWOOo4ssidXnP6DF+ylzds8ZKO4gF3kSvBOVPwmgdOPEdsJDCn4rP465E2u PvX8szJCF+lkuFuZsQOs7Jf4Ar0McRKt01JQHx3teDZOLcqEFGNTwbjfNd+9zrVe VWMUOv2cXUu+3pVggj5t4Td1puDT7y+07rw0VFRKqT6TqMAvp3H/vPRJR1kZ4Wpr 6Sbzlv2ww4uJx8NMtXBNWc7Vhtx2/XmJspX9rOqy4Q2EdVvh88c= =2NBy -----END PGP SIGNATURE-----
