summaryrefslogtreecommitdiffstats
path: root/source/n/proftpd/proftpd.SlackBuild
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2019-10-20 19:39:21 +0000
committer Eric Hameleers <alien@slackware.com>2019-10-21 08:59:48 +0200
commit71ceb94a1412ec19af5c69ad44880ad5cd8fd643 (patch)
treeaf9ec480fd862c2fe72b66f57ad1e19a239a85cc /source/n/proftpd/proftpd.SlackBuild
parentdd05912ef1074e257322f16fb01938f2463175c7 (diff)
downloadcurrent-71ceb94a1412ec19af5c69ad44880ad5cd8fd643.tar.gz
current-71ceb94a1412ec19af5c69ad44880ad5cd8fd643.tar.xz
Sun Oct 20 19:39:21 UTC 201920191020193921
d/python-2.7.17-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: Update vendorized expat library version to 2.2.8. Disallow URL paths with embedded whitespace or control characters into the underlying http client request. Such potentially malicious header injection URLs now cause an httplib.InvalidURL exception to be raised. Avoid file reading by disallowing ``local-file://`` and ``local_file://`` URL schemes in :func:`urllib.urlopen`, :meth:`urllib.URLopener.open` and :meth:`urllib.URLopener.retrieve`. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9948 (* Security fix *) n/proftpd-1.3.6b-x86_64-1.txz: Upgraded.
Diffstat (limited to '')
-rwxr-xr-xsource/n/proftpd/proftpd.SlackBuild4
1 files changed, 2 insertions, 2 deletions
diff --git a/source/n/proftpd/proftpd.SlackBuild b/source/n/proftpd/proftpd.SlackBuild
index a2484230a..21c219962 100755
--- a/source/n/proftpd/proftpd.SlackBuild
+++ b/source/n/proftpd/proftpd.SlackBuild
@@ -23,8 +23,8 @@
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=proftpd
-VERSION=1.3.6a
-DIRVER=1.3.6a
+VERSION=1.3.6b
+DIRVER=1.3.6b
BUILD=${BUILD:-1}
NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}