Mailinglist Archive: opensuse-updates (113 mails)

< Previous Next >
openSUSE-SU-2017:1035-1: moderate: Security update for proftpd
openSUSE Security Update: Security update for proftpd
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:1035-1
Rating: moderate
References: #1032443
Cross-References: CVE-2017-7418
Affected Products:
openSUSE Leap 42.2
openSUSE Leap 42.1
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:


This update for proftpd to version 1.3.5d fixes the following issues:

This security issue was fixed:

- CVE-2017-7418: ProFTPD checked only the last path component when
enforcing AllowChrootSymlinks. Attackers with local access could bypass
the AllowChrootSymlinks control by replacing a path component (other
than the last one) with a symbolic link (bsc#1032443).

These non-security issues were fixed:

- Reduce TLS protocols to TLSv1.1 and TLSv1.2
- Disable TLSCACertificateFile
- Add TLSCertificateChainFile
- All FTP logins are treated as anonymous logins again
- SSH rekey during authentication could have caused issues with clients.
- Recursive SCP uploads of multiple directories were not handled properly.
- LIST returned different results for file, depending on path syntax.
- "AuthAliasOnly on" in server config broke anonymous logins.
- Fixed memory leak when mod_facl is used.
- Fix systemd vs SysVinit inconsistency


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-481=1

- openSUSE Leap 42.1:

zypper in -t patch openSUSE-2017-481=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE Leap 42.2 (i586 x86_64):

proftpd-1.3.5d-6.3.1
proftpd-debuginfo-1.3.5d-6.3.1
proftpd-debugsource-1.3.5d-6.3.1
proftpd-devel-1.3.5d-6.3.1
proftpd-doc-1.3.5d-6.3.1
proftpd-ldap-1.3.5d-6.3.1
proftpd-ldap-debuginfo-1.3.5d-6.3.1
proftpd-mysql-1.3.5d-6.3.1
proftpd-mysql-debuginfo-1.3.5d-6.3.1
proftpd-pgsql-1.3.5d-6.3.1
proftpd-pgsql-debuginfo-1.3.5d-6.3.1
proftpd-radius-1.3.5d-6.3.1
proftpd-radius-debuginfo-1.3.5d-6.3.1
proftpd-sqlite-1.3.5d-6.3.1
proftpd-sqlite-debuginfo-1.3.5d-6.3.1

- openSUSE Leap 42.2 (noarch):

proftpd-lang-1.3.5d-6.3.1

- openSUSE Leap 42.1 (i586 x86_64):

proftpd-1.3.5d-7.1
proftpd-debuginfo-1.3.5d-7.1
proftpd-debugsource-1.3.5d-7.1
proftpd-devel-1.3.5d-7.1
proftpd-doc-1.3.5d-7.1
proftpd-ldap-1.3.5d-7.1
proftpd-ldap-debuginfo-1.3.5d-7.1
proftpd-mysql-1.3.5d-7.1
proftpd-mysql-debuginfo-1.3.5d-7.1
proftpd-pgsql-1.3.5d-7.1
proftpd-pgsql-debuginfo-1.3.5d-7.1
proftpd-radius-1.3.5d-7.1
proftpd-radius-debuginfo-1.3.5d-7.1
proftpd-sqlite-1.3.5d-7.1
proftpd-sqlite-debuginfo-1.3.5d-7.1

- openSUSE Leap 42.1 (noarch):

proftpd-lang-1.3.5d-7.1


References:

https://www.suse.com/security/cve/CVE-2017-7418.html
https://bugzilla.suse.com/1032443


< Previous Next >
This Thread
  • No further messages