Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in proftpd
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in proftpd
ID: openSUSE-SU-2020:0031-1
Distribution: SUSE
Plattformen: SUSE openSUSE Backports SLE-15, SUSE openSUSE Leap 15.1, SUSE openSUSE Backports SLE-15-SP1
Datum: Mo, 13. Januar 2020, 23:40
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12815
Applikationen: ProFTPD

Originalnachricht

   openSUSE Security Update: Security update for proftpd
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:0031-1
Rating: moderate
References: #1113041 #1144056 #1154600 #1155834 #1156210
#1157798 #1157803
Cross-References: CVE-2017-7418 CVE-2019-12815 CVE-2019-18217
CVE-2019-19269 CVE-2019-19270
Affected Products:
openSUSE Leap 15.1
openSUSE Backports SLE-15-SP1
openSUSE Backports SLE-15
______________________________________________________________________________

An update that solves 5 vulnerabilities and has two fixes
is now available.

Description:

This update for proftpd fixes the following issues:

* GeoIP has been discontinued by Maxmind (boo#1156210) This update removes
module build for geoip see
https://support.maxmind.com/geolite-legacy-discontinuation-notice/

- CVE-2019-19269: Fixed a NULL pointer dereference may occur when
validating the certificate of a client connecting to the server
(boo#1157803)
- CVE-2019-19270: Fixed a Failure to check for the appropriate field of a
CRL entry prevents some valid CRLs from being taken into account
(boo#1157798)
- CVE-2019-18217: Fixed remote unauthenticated denial-of-service due to
incorrect handling of overly long commands (boo#1154600 gh#846)

Update to 1.3.6b

* Fixed pre-authentication remote denial-of-service issue (Issue #846).
* Backported fix for building mod_sql_mysql using MySQL 8 (Issue #824).

Update to 1.3.6a:

* Fixed symlink navigation (Bug#4332).
* Fixed building of mod_sftp using OpenSSL 1.1.x releases (Issue#674).
* Fixed SITE COPY honoring of <Limit> restrictions (Bug#4372).
* Fixed segfault on login when using mod_sftp + mod_sftp_pam (Issue#656).
* Fixed restarts when using mod_facl as a static module
* Add missing Requires(pre): group(ftp) for Leap 15 and Tumbleweed
(boo#1155834)
* Add missing Requires(pre): user(ftp) for Leap 15 and Tumbleweed
(boo#1155834)
* Use pam_keyinit.so (boo#1144056)

- Reduce hard dependency on systemd to only that which is necessary for
building and installation.

update to 1.3.6:

* Support for using Redis for caching, logging; see the
doc/howto/Redis.html documentation.
* Fixed mod_sql_postgres SSL support (Issue #415).
* Support building against LibreSSL instead of OpenSSL (Issue #361).
* Better support on AIX for login restraictions (Bug #4285).
* TimeoutLogin (and other timeouts) were not working properly for SFTP
connections (Bug#4299).
* Handling of the SIGILL and SIGINT signals, by the daemon process, now
causes the child processes to be terminated as well (Issue #461).
* RPM .spec file naming changed to conform to Fedora guidelines.
* Fix for "AllowChrootSymlinks off" checking each component for
symlinks
(CVE-2017-7418).

New Modules:

* mod_redis, mod_tls_redis, mod_wrap2_redis With Redis now supported as a
caching mechanism, similar to Memcache, there are now Redis-using
modules: mod_redis (for configuring the Redis connection information),
mod_tls_redis (for caching SSL sessions and OCSP information using
Redis), and mod_wrap2_redis (for using ACLs stored in Redis).

Changed Modules:

* mod_ban: The mod_ban module's BanCache directive can now use
Redis-based
caching; see doc/contrib/mod_ban.html#BanCache.

-New Configuration Directives

* SQLPasswordArgon2, SQLPasswordScrypt

The key lengths for Argon2 and Scrypt-based passwords are now
configurable via these new directives; previously, the key length had been
hardcoded to be 32 bytes, which is not interoperable with all other
implementations (Issue #454).

Changed Configuration Directives

* AllowChrootSymlinks When "AllowChrootSymlinks off" was used, only
the
last portion of the DefaultRoot path would be checked to see if it was a
symlink. Now, each component of the DefaultRoot path will be checked to
see if it is a symlink when "AllowChrootSymlinks off" is used.
* Include The Include directive can now be used within a <Limit>
section,
e.g.: <Limit LOGIN> Include /path/to/allowed.txt DenyAll
</Limit> API
Changes
* A new JSON API has been added, for use by third-party modules.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-31=1

- openSUSE Backports SLE-15-SP1:

zypper in -t patch openSUSE-2020-31=1

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2020-31=1



Package List:

- openSUSE Leap 15.1 (x86_64):

proftpd-1.3.6b-lp151.3.6.1
proftpd-debuginfo-1.3.6b-lp151.3.6.1
proftpd-debugsource-1.3.6b-lp151.3.6.1
proftpd-devel-1.3.6b-lp151.3.6.1
proftpd-doc-1.3.6b-lp151.3.6.1
proftpd-ldap-1.3.6b-lp151.3.6.1
proftpd-ldap-debuginfo-1.3.6b-lp151.3.6.1
proftpd-mysql-1.3.6b-lp151.3.6.1
proftpd-mysql-debuginfo-1.3.6b-lp151.3.6.1
proftpd-pgsql-1.3.6b-lp151.3.6.1
proftpd-pgsql-debuginfo-1.3.6b-lp151.3.6.1
proftpd-radius-1.3.6b-lp151.3.6.1
proftpd-radius-debuginfo-1.3.6b-lp151.3.6.1
proftpd-sqlite-1.3.6b-lp151.3.6.1
proftpd-sqlite-debuginfo-1.3.6b-lp151.3.6.1

- openSUSE Leap 15.1 (noarch):

proftpd-lang-1.3.6b-lp151.3.6.1

- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):

proftpd-1.3.6b-bp151.4.6.2
proftpd-devel-1.3.6b-bp151.4.6.2
proftpd-doc-1.3.6b-bp151.4.6.2
proftpd-ldap-1.3.6b-bp151.4.6.2
proftpd-mysql-1.3.6b-bp151.4.6.2
proftpd-pgsql-1.3.6b-bp151.4.6.2
proftpd-radius-1.3.6b-bp151.4.6.2
proftpd-sqlite-1.3.6b-bp151.4.6.2

- openSUSE Backports SLE-15-SP1 (noarch):

proftpd-lang-1.3.6b-bp151.4.6.2

- openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):

proftpd-1.3.6b-bp150.3.6.1
proftpd-debuginfo-1.3.6b-bp150.3.6.1
proftpd-debugsource-1.3.6b-bp150.3.6.1
proftpd-devel-1.3.6b-bp150.3.6.1
proftpd-doc-1.3.6b-bp150.3.6.1
proftpd-ldap-1.3.6b-bp150.3.6.1
proftpd-ldap-debuginfo-1.3.6b-bp150.3.6.1
proftpd-mysql-1.3.6b-bp150.3.6.1
proftpd-mysql-debuginfo-1.3.6b-bp150.3.6.1
proftpd-pgsql-1.3.6b-bp150.3.6.1
proftpd-pgsql-debuginfo-1.3.6b-bp150.3.6.1
proftpd-radius-1.3.6b-bp150.3.6.1
proftpd-radius-debuginfo-1.3.6b-bp150.3.6.1
proftpd-sqlite-1.3.6b-bp150.3.6.1
proftpd-sqlite-debuginfo-1.3.6b-bp150.3.6.1

- openSUSE Backports SLE-15 (noarch):

proftpd-lang-1.3.6b-bp150.3.6.1


References:

https://www.suse.com/security/cve/CVE-2017-7418.html
https://www.suse.com/security/cve/CVE-2019-12815.html
https://www.suse.com/security/cve/CVE-2019-18217.html
https://www.suse.com/security/cve/CVE-2019-19269.html
https://www.suse.com/security/cve/CVE-2019-19270.html
https://bugzilla.suse.com/1113041
https://bugzilla.suse.com/1144056
https://bugzilla.suse.com/1154600
https://bugzilla.suse.com/1155834
https://bugzilla.suse.com/1156210
https://bugzilla.suse.com/1157798
https://bugzilla.suse.com/1157803

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung