Fedora 30: proftpd FEDORA-2019-7559f29ace

    Date28 Oct 2019
    CategoryFedora
    437
    Posted ByLinuxSecurity Advisories
    This is a cumulative bug-fix update from upstream, including a fix for a pre- authentication remote denial of service issue.
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2019-7559f29ace
    2019-10-29 01:07:34.725333
    --------------------------------------------------------------------------------
    
    Name        : proftpd
    Product     : Fedora 30
    Version     : 1.3.6b
    Release     : 1.fc30
    URL         : http://www.proftpd.org/
    Summary     : Flexible, stable and highly-configurable FTP server
    Description :
    ProFTPD is an enhanced FTP server with a focus toward simplicity, security,
    and ease of configuration. It features a very Apache-like configuration
    syntax, and a highly customizable server infrastructure, including support for
    multiple 'virtual' FTP servers, anonymous FTP, and permission-based directory
    visibility.
    
    This package defaults to the standalone behavior of ProFTPD, but all the
    needed scripts to have it run by systemd instead are included.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    This is a cumulative bug-fix update from upstream, including a fix for a pre-
    authentication remote denial of service issue.
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Sun Oct 20 2019 Paul Howarth  - 1.3.6b-1
    - Update to 1.3.6b
      - Fixed pre-authentication remote denial-of-service issue
        (https://github.com/proftpd/proftpd/issues/846)
    * Sun Oct 13 2019 Paul Howarth  - 1.3.6a-1
    - Update to 1.3.6a
      - Configure script wrongly detected AIX lastlog functions
        (http://bugs.proftpd.org/show_bug.cgi?id=4304)
      - AllowChrootSymlinks off could cause login failures depending on filesystem
        permissions (http://bugs.proftpd.org/show_bug.cgi?id=4306)
      - mod_ctrls: error: unable to bind to local socket: Address already in use
        (https://github.com/proftpd/proftpd/issues/501)
      - Failed to handle multiple %{env:...} variables in single word in
        configuration (https://github.com/proftpd/proftpd/issues/507)
      - mod_sftp failed to check shadow password information when publickey
        authentication used (http://bugs.proftpd.org/show_bug.cgi?id=4308)
      - Use of "AllowEmptyPasswords off" broke SFTP/SCP logins
        (http://bugs.proftpd.org/show_bug.cgi?id=4309)
      - Use of mod_facl as static module caused ProFTPD to die on SIGHUP/restart
        (http://bugs.proftpd.org/show_bug.cgi?id=4310)
      - Use of This email address is being protected from spambots. You need JavaScript enabled to view it. SSH2 key exchange sometimes failed
        (https://github.com/proftpd/proftpd/issues/556)
      - Close extra file descriptors at startup
        (http://bugs.proftpd.org/show_bug.cgi?id=4312)
      -  with AuthAliasOnly in effect did not work as expected
        (http://bugs.proftpd.org/show_bug.cgi?id=4314)
      - CreateHome NoRootPrivs only worked partially
        (https://github.com/proftpd/proftpd/issues/568)
      - SFTP OPEN response included attribute flags that are not actually provided
        (https://github.com/proftpd/proftpd/issues/578)
      - Truncation of file while being downloaded with sendfile enabled caused
        timeouts due to infinite loop (http://bugs.proftpd.org/show_bug.cgi?id=4318)
      - FTP uploads frequently broke due to "Interrupted system call" error
        (http://bugs.proftpd.org/show_bug.cgi?id=4319)
      - Site-to-site transfers over TLS failed
        (https://github.com/proftpd/proftpd/issues/618)
      - Can't see symlinks using any FTP client when using MLSD
        (http://bugs.proftpd.org/show_bug.cgi?id=4322)
      - mod_tls 1.3.6 failed to compile using OpenSSL 0.9.8e
        (http://bugs.proftpd.org/show_bug.cgi?id=4325)
      - Using MaxClientsPerHost 1 in  section denied logins
        (http://bugs.proftpd.org/show_bug.cgi?id=4326)
      - SQLNamedConnectInfo with different backend database did not work properly
        (https://github.com/proftpd/proftpd/issues/642)
      - Segfault with mod_sftp+mod_sftp_pam after successful authentication using
        keyboard-interactive method (https://github.com/proftpd/proftpd/issues/656)
      - autoconf always failed to detect support for FIPS
        (https://github.com/proftpd/proftpd/issues/660)
      - SFTP connections failed when using "arcfour256" cipher
        (https://github.com/proftpd/proftpd/issues/663)
      - mod_auth_otp failed to build with OpenSSL 1.1.x
        (http://bugs.proftpd.org/show_bug.cgi?id=4335)
      - scp broken on FreeBSD 11 (http://bugs.proftpd.org/show_bug.cgi?id=4341)
      - Update mod_sftp to handle changed APIs in OpenSSL 1.1.x releases
        (https://github.com/proftpd/proftpd/issues/674)
      - Infinite loop possible in mod_sftp's set_sftphostkey() function
        (http://bugs.proftpd.org/show_bug.cgi?id=4356)
      - Some ASCII text files corrupted when downloading
        (http://bugs.proftpd.org/show_bug.cgi?id=4352)
      - Properly use the --includedir, --libdir configure variables in the
        generated proftpd.pc pkgconfig file
        (https://github.com/proftpd/proftpd/issues/797)
      - Reading invalid SSH key from database resulted in unexpected/unlogged
        disconnect failures (http://bugs.proftpd.org/show_bug.cgi?id=4350)
      - Symlink navigation broken after 1.3.6 update
        (http://bugs.proftpd.org/show_bug.cgi?id=4332)
      - Unable to connect to ProFTPD using TLSSessionTickets and TLSv1.3
        (https://github.com/proftpd/proftpd/issues/795)
      - SITE CPFR/CPTO did not honor  configurations
        (http://bugs.proftpd.org/show_bug.cgi?id=4372)
      - Using "TLSProtocol SSLv23" did not enable all protocol versions
        (https://github.com/proftpd/proftpd/issues/807)
    * Tue Jul 23 2019 Paul Howarth  - 1.3.6-21
    - An arbitrary file copy vulnerability in mod_copy in ProFTPD allowed for
      remote code execution and information disclosure without authentication
      (CVE-2019-12815)
      http://bugs.proftpd.org/show_bug.cgi?id=4372
      https://github.com/proftpd/proftpd/pull/816
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1764415 - CVE-2019-18217 proftpd: denial of service due to incorrect handling of long command
            https://bugzilla.redhat.com/show_bug.cgi?id=1764415
    --------------------------------------------------------------------------------
    
    This update can be installed with the "dnf" update program. Use
    su -c 'dnf upgrade --advisory FEDORA-2019-7559f29ace' at the command
    line. For more information, refer to the dnf documentation available at
    http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
    
    All packages are signed with the Fedora Project GPG key. More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
    To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
    Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
    List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
    List Archives: https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"66","type":"x","order":"1","pct":57.39,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.04,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"34","type":"x","order":"3","pct":29.57,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.