FEDORA-EPEL-2016-7640e3144a

security update in Fedora EPEL 6 for proftpd

Status: stable 2 years ago

This update fixes issues with selection of inappropriate DH parameters, which could lead to encrypted traffic being more easily decrypted than it should be.

How to install

sudo dnf upgrade --advisory=FEDORA-EPEL-2016-7640e3144a

Comments 8

This update has been submitted for testing by pghmcfc.

This update has been pushed to testing.

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

pghmcfc edited this update.

New build(s):

  • proftpd-1.3.3g-10.el6

Removed build(s):

  • proftpd-1.3.3g-9.el6

This update has been submitted for testing by pghmcfc.

This update has been pushed to testing.

This update has been submitted for stable by pghmcfc.

This update has been pushed to stable.


Add Comment & Feedback
Toggle Preview

Comment fields support Fedora-Flavored Markdown. Comments are governed under this privacy policy.

-1 0 +1 Feedback Guidelines

Is the update generally functional? (karma)

You need to be logged in to add karma!

#1317420 CVE-2016-3125 proftpd: usage of 1024 bit DH key even with manual parameters set
#1317422 CVE-2016-3125 proftpd: usage of 1024 bit DH key even with manual parameters set [epel-all]
Content Type
RPM
Status
stable
Test Gating
Submitted by
Update Type
security
Update Severity
low
Karma
0
Autopush
Disabled
Dates
submitted 3 years ago
in testing 2 years ago
in stable 2 years ago
modified 2 years ago

Related Bugs 2

00 #1317420 CVE-2016-3125 proftpd: usage of 1024 bit DH key even with manual parameters set
00 #1317422 CVE-2016-3125 proftpd: usage of 1024 bit DH key even with manual parameters set [epel-all]

Automated Test Results