Package: release.debian.org Severity: normal Tags: stretch User: [email protected] Usertags: pu
Hello, te attached debdiff fixes the issues #946345 proftpd-dfsg: CVE-2019-19269 ...for Debian stretch. I built/installed the package an Debian oldstable and could login into the server and transfer file. Hilmar -- System Information: Debian Release: bullseye/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 5.3.0-3-686-pae (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_GB.UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_GB.UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system)
diff -Nru proftpd-dfsg-1.3.5b/debian/changelog proftpd-dfsg-1.3.5b/debian/changelog --- proftpd-dfsg-1.3.5b/debian/changelog 2019-10-23 23:34:50.000000000 +0200 +++ proftpd-dfsg-1.3.5b/debian/changelog 2019-12-08 16:52:34.000000000 +0100 @@ -1,3 +1,11 @@ +proftpd-dfsg (1.3.5b-4+deb9u3) stretch-security; urgency=medium + + * Cherry pick patch from upstream: + - for upstream 861 (CVE-2019-19269) (Closes: #946345) + upstream_pull_861_CVE-2019-19269 + + -- Hilmar Preusse <[email protected]> Sun, 08 Dec 2019 16:52:34 +0100 + proftpd-dfsg (1.3.5b-4+deb9u2) stretch-security; urgency=high * Add patch from upstream to address CVE-2019-18217. diff -Nru proftpd-dfsg-1.3.5b/debian/patches/series proftpd-dfsg-1.3.5b/debian/patches/series --- proftpd-dfsg-1.3.5b/debian/patches/series 2019-10-23 23:24:27.000000000 +0200 +++ proftpd-dfsg-1.3.5b/debian/patches/series 2019-12-08 16:52:34.000000000 +0100 @@ -17,3 +17,4 @@ CVE-2017-7418 proftpd-1.3.5e-CVE-2019-12815.patch bug_846_CVE-2019-18217.patch +upstream_861_CVE-2019-19269 diff -Nru proftpd-dfsg-1.3.5b/debian/patches/upstream_861_CVE-2019-19269 proftpd-dfsg-1.3.5b/debian/patches/upstream_861_CVE-2019-19269 --- proftpd-dfsg-1.3.5b/debian/patches/upstream_861_CVE-2019-19269 1970-01-01 01:00:00.000000000 +0100 +++ proftpd-dfsg-1.3.5b/debian/patches/upstream_861_CVE-2019-19269 2019-12-08 16:52:34.000000000 +0100 @@ -0,0 +1,12 @@ +--- proftpd-dfsg.orig/contrib/mod_tls.c ++++ proftpd-dfsg/contrib/mod_tls.c +@@ -5862,6 +5862,9 @@ + ASN1_INTEGER *sn; + + revoked = sk_X509_REVOKED_value(X509_CRL_get_REVOKED(crl), i); ++ if (revoked == NULL) { ++ continue; ++ } + sn = revoked->serialNumber; + + if (ASN1_INTEGER_cmp(sn, X509_get_serialNumber(xs)) == 0) {

