Mageia alert MGASA-2016-0128 (proftpd)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2016-0128: Updated proftpd packages fix security vulnerability | |
Date: | Thu, 31 Mar 2016 22:23:04 +0200 | |
Message-ID: | <20160331202304.05CBE9F640@duvel.mageia.org> |
MGASA-2016-0128 - Updated proftpd packages fix security vulnerability Publication date: 31 Mar 2016 URL: http://advisories.mageia.org/MGASA-2016-0128.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-3125 Description: A bug with security implications was found in the mod_tls module in ProFTPD before 1.3.5b. This module has a configuration option TLSDHParamFile to specify user-defined Diffie Hellman parameters. The software would ignore the user-defined parameters and use Diffie Hellman key exchanges with 1024 bits (CVE-2016-3125). The proftpd package has been updated to version 1.3.5b, which fixes this issue and other bugs, including: - SSH RSA hostkeys smaller than 2048 bits now work properly. - MLSD response lines are now properly CRLF terminated. References: - https://bugs.mageia.org/show_bug.cgi?id=17960 - http://www.proftpd.org/docs/RELEASE_NOTES-1.3.5b - https://lists.fedoraproject.org/pipermail/package-announc... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3125 SRPMS: - 5/core/proftpd-1.3.5b-1.mga5