a1859b6204
Fixes the following security issues: - CVE-2020-9273: In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution. And additionally, fixes a number of other issues. For details, see the release notes: https://github.com/proftpd/proftpd/blob/1.3.6/RELEASE_NOTES This also bumps the bundled libcap, so 0001-fix-kernel-header-capability-version.patch can be dropped. While we are at it, adjust the white space in the .hash function to match the new agreements. Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
4 lines
199 B
Plaintext
4 lines
199 B
Plaintext
# Locally calculated
|
|
sha256 fa3541c4b34136a7b80cb12a2f6f9a0cab5118a5b0a1653d40af49c6479c35ad proftpd-1.3.6c.tar.gz
|
|
sha256 391a473d755c29b5326fb726326ff3c37e42512f53a8f5789fc310232150bf80 COPYING
|