Darcsweb-Url: http://darcs.frugalware.org/darcsweb/darcsweb.cgi?r=homepage-ng;a=darcs_commitdiff;h=20061125144212-dd049-c8215cf2c88b142d64f54a5eac6e1a5a1b4cc871.gz;
[FSA59-proftpd voroskoi <[EMAIL PROTECTED]>**20061125144212] { hunk ./frugalware/xml/security.xml 29 + <fsa> + <id>59</id> + <date>2006-11-25</date> + <author>voroskoi</author> + <package>proftpd</package> + <vulnerable>1.3.0-1</vulnerable> + <unaffected>1.3.0-2siwenna1</unaffected> + <bts>http://bugs.frugalware.org/task/1484</bts> + <cve>There is no CVE for this issue, see: http://secunia.com/advisories/22821</cve> + <desc>A vulnerability has been reported in ProFTPD, which can be exploited by malicious people to cause a DoS (Denial of Service). + The vulnerability is caused due to an error within the "cmd_loop()" function in main.c when the "CommandBufferSize" option is enabled.</desc> + </fsa> } _______________________________________________ Frugalware-darcs mailing list Frugalware-darcs@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-darcs