Sicherheit: Ausführen beliebiger Kommandos in proftpd
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in proftpd
ID: FEDORA-2020-876b1f664e
Distribution: Fedora
Plattformen: Fedora 31
Datum: Do, 27. Februar 2020, 21:13
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9273
Applikationen: ProFTPD


Fedora Update Notification
2020-02-27 17:26:04.898880

Name : proftpd
Product : Fedora 31
Version : 1.3.6c
Release : 1.fc31
URL : http://www.proftpd.org/
Summary : Flexible, stable and highly-configurable FTP server
Description :
ProFTPD is an enhanced FTP server with a focus toward simplicity, security,
and ease of configuration. It features a very Apache-like configuration
syntax, and a highly customizable server infrastructure, including support for
multiple 'virtual' FTP servers, anonymous FTP, and permission-based

This package defaults to the standalone behavior of ProFTPD, but all the
needed scripts to have it run by systemd instead are included.

Update Information:

This update, to the current upstream stable release version, is a cumulative
bug-fix release including a security fix for a use-after-free vulnerability
(CVE-2020-9273): successful exploitation of this vulnerability could allow a
remote attacker to execute arbitrary code on the affected system.

* Wed Feb 19 2020 Paul Howarth <paul@city-fan.org> - 1.3.6c-1
- Update to 1.3.6c
- Use-after-free vulnerability in memory pools during data transfer
- Fix mod_tls compilation with LibreSSL 2.9.x
- MaxClientsPerUser was not enforced for SFTP logins when mod_digest was
enabled (https://github.com/proftpd/proftpd/issues/750)
- mod_sftp now handles an OpenSSH-specific private key format; it detects
such keys, and logs a hint about reformatting them to a supported format
- Directory listing was slower compared to previous ProFTPD versions
- mod_sftp crashed when using pubkey-auth with DSA keys
- Fix improper handling of TLS CRL lookups (CVE-2019-19269, CVE-2019-19270,
- Leaking PAM handler and data in case of unsuccessful authentication
- SSH authentication failed for many clients due to receiving of
SSH_MSG_IGNORE packet (http://bugs.proftpd.org/show_bug.cgi?id=4385)
- SFTP publickey authentication failed unexpectedly when user had no shadow
password info. (https://github.com/proftpd/proftpd/issues/890)
- ftpasswd failed to restore password file permissions in some cases
- Out-of-bounds read in mod_cap getstateflags() function; this has been
addressed by updating the bundled version of libcap
Note that this build of ProFTPD uses the system version of libcap and not
the bundled version
* Thu Jan 30 2020 Fedora Release Engineering <releng@fedoraproject.org> -
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
* Wed Jan 22 2020 Paul Howarth <paul@city-fan.org> - 1.3.6b-3
- Fix API tests compile failure with GCC 10
- mod_sftp: When handling the 'keyboard-interactive' authentication mechanism,
as used for (e.g.) PAM, make sure to properly handle DEBUG, IGNORE,
DISCONNECT, and UNIMPLEMENTED messages, per RFC 4253
* Fri Nov 29 2019 Paul Howarth <paul@city-fan.org> - 1.3.6b-2
- Fix handling of CRL lookups by properly using issuer for lookups, and
guarding against null pointers (GH#859, GH#861, CVE-2019-19269,
* Sun Oct 20 2019 Paul Howarth <paul@city-fan.org> - 1.3.6b-1
- Update to 1.3.6b
- Fixed pre-authentication remote denial-of-service issue
(CVE-2019-18217, https://github.com/proftpd/proftpd/issues/846)
* Sun Oct 13 2019 Paul Howarth <paul@city-fan.org> - 1.3.6a-1
- Update to 1.3.6a
- Configure script wrongly detected AIX lastlog functions
- AllowChrootSymlinks off could cause login failures depending on filesystem
permissions (http://bugs.proftpd.org/show_bug.cgi?id=4306)
- mod_ctrls: error: unable to bind to local socket: Address already in use
- Failed to handle multiple %{env:...} variables in single word in
configuration (https://github.com/proftpd/proftpd/issues/507)
- mod_sftp failed to check shadow password information when publickey
authentication used (http://bugs.proftpd.org/show_bug.cgi?id=4308)
- Use of "AllowEmptyPasswords off" broke SFTP/SCP logins
- Use of mod_facl as static module caused ProFTPD to die on SIGHUP/restart
- Use of curve25519-sha256@libssh.org SSH2 key exchange sometimes failed
- Close extra file descriptors at startup
- <Anonymous> with AuthAliasOnly in effect did not work as expected
- CreateHome NoRootPrivs only worked partially
- SFTP OPEN response included attribute flags that are not actually provided
- Truncation of file while being downloaded with sendfile enabled caused
timeouts due to infinite loop http://bugs.proftpd.org/show_bug.cgi?id=4318
- FTP uploads frequently broke due to "Interrupted system call" error
- Site-to-site transfers over TLS failed
- Can't see symlinks using any FTP client when using MLSD
- mod_tls 1.3.6 failed to compile using OpenSSL 0.9.8e
- Using MaxClientsPerHost 1 in <Anonymous> section denied logins
- SQLNamedConnectInfo with different backend database did not work properly
- Segfault with mod_sftp+mod_sftp_pam after successful authentication using
keyboard-interactive method (https://github.com/proftpd/proftpd/issues/656)
- autoconf always failed to detect support for FIPS
- SFTP connections failed when using "arcfour256" cipher
- mod_auth_otp failed to build with OpenSSL 1.1.x
- scp broken on FreeBSD 11 (http://bugs.proftpd.org/show_bug.cgi?id=4341)
- Update mod_sftp to handle changed APIs in OpenSSL 1.1.x releases
- Infinite loop possible in mod_sftp's set_sftphostkey() function
- Some ASCII text files corrupted when downloading
- Properly use the --includedir, --libdir configure variables in the
generated proftpd.pc pkgconfig file
- Reading invalid SSH key from database resulted in unexpected/unlogged
disconnect failures (http://bugs.proftpd.org/show_bug.cgi?id=4350)
- Symlink navigation broken after 1.3.6 update
- Unable to connect to ProFTPD using TLSSessionTickets and TLSv1.3
- SITE CPFR/CPTO did not honor <Limit> configurations
- Using "TLSProtocol SSLv23" did not enable all protocol versions

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-876b1f664e' at the command
line. For more information, refer to the dnf documentation available at

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux @Facebook
Neue Nachrichten