openSUSE Security Update: Security update for proftpd
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2024:0008-1
Rating:             important
References:         #1218144 #1218344 
Cross-References:   CVE-2023-48795 CVE-2023-51713
CVSS scores:
                    CVE-2023-48795 (NVD) : 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
                    CVE-2023-48795 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Affected Products:
                    openSUSE Backports SLE-15-SP5
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:

   This update for proftpd fixes the following issues:

   proftpd was updated to 1.3.8b - released 19-Dec-2023

   - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity
     (boo#1218144)
   - CVE-2023-51713: Fixed Out-of-bounds buffer read when handling FTP
     commands. (boo#1218344)


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP5:

      zypper in -t patch openSUSE-2024-8=1



Package List:

   - openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):

      proftpd-1.3.8b-bp155.2.6.1
      proftpd-devel-1.3.8b-bp155.2.6.1
      proftpd-doc-1.3.8b-bp155.2.6.1
      proftpd-ldap-1.3.8b-bp155.2.6.1
      proftpd-mysql-1.3.8b-bp155.2.6.1
      proftpd-pgsql-1.3.8b-bp155.2.6.1
      proftpd-radius-1.3.8b-bp155.2.6.1
      proftpd-sqlite-1.3.8b-bp155.2.6.1

   - openSUSE Backports SLE-15-SP5 (noarch):

      proftpd-lang-1.3.8b-bp155.2.6.1


References:

   https://www.suse.com/security/cve/CVE-2023-48795.html
   https://www.suse.com/security/cve/CVE-2023-51713.html
   https://bugzilla.suse.com/1218144
   https://bugzilla.suse.com/1218344

openSUSE: 2024:0008-1 important: proftpd

January 4, 2024
An update that fixes two vulnerabilities is now available

Description

This update for proftpd fixes the following issues: proftpd was updated to 1.3.8b - released 19-Dec-2023 - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (boo#1218144) - CVE-2023-51713: Fixed Out-of-bounds buffer read when handling FTP commands. (boo#1218344)

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP5: zypper in -t patch openSUSE-2024-8=1


Package List

- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64): proftpd-1.3.8b-bp155.2.6.1 proftpd-devel-1.3.8b-bp155.2.6.1 proftpd-doc-1.3.8b-bp155.2.6.1 proftpd-ldap-1.3.8b-bp155.2.6.1 proftpd-mysql-1.3.8b-bp155.2.6.1 proftpd-pgsql-1.3.8b-bp155.2.6.1 proftpd-radius-1.3.8b-bp155.2.6.1 proftpd-sqlite-1.3.8b-bp155.2.6.1 - openSUSE Backports SLE-15-SP5 (noarch): proftpd-lang-1.3.8b-bp155.2.6.1


References

https://www.suse.com/security/cve/CVE-2023-48795.html https://www.suse.com/security/cve/CVE-2023-51713.html https://bugzilla.suse.com/1218144 https://bugzilla.suse.com/1218344


Severity
Announcement ID: openSUSE-SU-2024:0008-1
Rating: important
Affected Products: openSUSE Backports SLE-15-SP5 .

Related News