New proftpd packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and 11.0 to fix security issues.
More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171
Here are the details from the Slackware 11.0 ChangeLog:
+--------------------------+
patches/packages/proftpd-1.3.0a-i486-1_slack11.0.tgz:
Upgraded to proftpd-1.3.0a plus an additional security patch. Several
security issues were found in proftpd that could lead to the execution of
arbitrary code by a remote attacker, including one in mod_tls that does
not require the attacker to be authenticated first.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project!
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/proftpd-1.3.0a-i386-1_slack8.1.tgz
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/proftpd-1.3.0a-i386-1_slack9.0.tgz
Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/proftpd-1.3.0a-i486-1_slack9.1.tgz
Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/proftpd-1.3.0a-i486-1_slack10.0.tgz
Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/proftpd-1.3.0a-i486-1_slack10.1.tgz
Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/proftpd-1.3.0a-i486-1_slack10.2.tgz
Updated package for Slackware 11.0:
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/proftpd-1.3.0a-i486-1_slack11.0.tgz
MD5 signatures:
+-------------+
Slackware 8.1 package:
74e7540bd3a29270b6192e470a456b45 proftpd-1.3.0a-i386-1_slack8.1.tgz
Slackware 9.0 package:
50ad4d2161afb3e8f215cb6355d5960c proftpd-1.3.0a-i386-1_slack9.0.tgz
Slackware 9.1 package:
4264ec744b7e964ec8ba659a038edc77 proftpd-1.3.0a-i486-1_slack9.1.tgz
Slackware 10.0 package:
58ab727acfaba50b1acb16d49d02570b proftpd-1.3.0a-i486-1_slack10.0.tgz
Slackware 10.1 package:
4d4560f63398633cdcfe4dda9b9c39da proftpd-1.3.0a-i486-1_slack10.1.tgz
Slackware 10.2 package:
8253edd497dc19bef0d6b215dc9e4e34 proftpd-1.3.0a-i486-1_slack10.2.tgz
Slackware 11.0 package:
6964fa68393b79c0d1493843a709f339 proftpd-1.3.0a-i486-1_slack11.0.tgz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg proftpd-1.3.0a-i486-1_slack11.0.tgz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171
Here are the details from the Slackware 11.0 ChangeLog:
+--------------------------+
patches/packages/proftpd-1.3.0a-i486-1_slack11.0.tgz:
Upgraded to proftpd-1.3.0a plus an additional security patch. Several
security issues were found in proftpd that could lead to the execution of
arbitrary code by a remote attacker, including one in mod_tls that does
not require the attacker to be authenticated first.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project!
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/proftpd-1.3.0a-i386-1_slack8.1.tgz
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/proftpd-1.3.0a-i386-1_slack9.0.tgz
Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/proftpd-1.3.0a-i486-1_slack9.1.tgz
Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/proftpd-1.3.0a-i486-1_slack10.0.tgz
Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/proftpd-1.3.0a-i486-1_slack10.1.tgz
Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/proftpd-1.3.0a-i486-1_slack10.2.tgz
Updated package for Slackware 11.0:
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/proftpd-1.3.0a-i486-1_slack11.0.tgz
MD5 signatures:
+-------------+
Slackware 8.1 package:
74e7540bd3a29270b6192e470a456b45 proftpd-1.3.0a-i386-1_slack8.1.tgz
Slackware 9.0 package:
50ad4d2161afb3e8f215cb6355d5960c proftpd-1.3.0a-i386-1_slack9.0.tgz
Slackware 9.1 package:
4264ec744b7e964ec8ba659a038edc77 proftpd-1.3.0a-i486-1_slack9.1.tgz
Slackware 10.0 package:
58ab727acfaba50b1acb16d49d02570b proftpd-1.3.0a-i486-1_slack10.0.tgz
Slackware 10.1 package:
4d4560f63398633cdcfe4dda9b9c39da proftpd-1.3.0a-i486-1_slack10.1.tgz
Slackware 10.2 package:
8253edd497dc19bef0d6b215dc9e4e34 proftpd-1.3.0a-i486-1_slack10.2.tgz
Slackware 11.0 package:
6964fa68393b79c0d1493843a709f339 proftpd-1.3.0a-i486-1_slack11.0.tgz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg proftpd-1.3.0a-i486-1_slack11.0.tgz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com