[SSA:2023-354-01] proftpd
New proftpd packages are available for Slackware 14.0, 14.1, 14.2, 15.0,
and -current to fix a security issue.
Here are the details from the Slackware 15.0 ChangeLog
patches/packages/proftpd-1.3.8b-i586-1_slack15.0.txz: Upgraded.
This update fixes a security issue:
mod_sftp: implemented mitigations for "Terrapin" SSH attack.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-48795
(* Security fix *)
Where to find the new packages
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/proftpd-1.3.8b-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/proftpd-1.3.8b-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/proftpd-1.3.8b-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/proftpd-1.3.8b-x86_64-1_slack14.1.txz
Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/proftpd-1.3.8b-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/proftpd-1.3.8b-x86_64-1_slack14.2.txz
Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/proftpd-1.3.8b-i586-1_slack15.0.txz
Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/proftpd-1.3.8b-x86_64-1_slack15.0.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/proftpd-1.3.8b-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/proftpd-1.3.8b-x86_64-1.txz
MD5 signatures
Slackware 14.0 package:
79ebaf263d088d62cf7b0897e3908e79 proftpd-1.3.8b-i486-1_slack14.0.txz
Slackware x86_64 14.0 package:
c0e6a80bc274087fe9f738bd52c4ae5b proftpd-1.3.8b-x86_64-1_slack14.0.txz
Slackware 14.1 package:
0622b22327bf55b71a5f136eafbbffbd proftpd-1.3.8b-i486-1_slack14.1.txz
Slackware x86_64 14.1 package:
718ea14965856be15d8dad5d730e28fd proftpd-1.3.8b-x86_64-1_slack14.1.txz
Slackware 14.2 package:
af54155ff2e9a9d5cb2caefb24f5fb95 proftpd-1.3.8b-i586-1_slack14.2.txz
Slackware x86_64 14.2 package:
192ced161307e17ad8e693408488d88e proftpd-1.3.8b-x86_64-1_slack14.2.txz
Slackware 15.0 package:
d459babbab7447215e65577a847b0eeb proftpd-1.3.8b-i586-1_slack15.0.txz
Slackware x86_64 15.0 package:
603638e2b7ca0db3f4463a73525ee2a5 proftpd-1.3.8b-x86_64-1_slack15.0.txz
Slackware -current package:
9bf202802b1fdf70e3cdeff86a89ef09 n/proftpd-1.3.8b-i586-1.txz
Slackware x86_64 -current package:
dfbbc5d28742b30770b35a36db8e2763 n/proftpd-1.3.8b-x86_64-1.txz
Installation instructions
Upgrade the package as root:
# upgradepkg proftpd-1.3.8b-i586-1_slack15.0.txz
- ID
- SSA:2023-354-01
- Severity
- medium
- Severity from
- CVE-2023-48795
- URL
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2023&m=slackware-security.462318
- Published
-
2023-12-20T21:14:12
(9 months ago) - Modified
-
2023-12-20T21:14:12
(9 months ago) - Rights
- Slackware Linux Security Team
- Other Advisories
-
- ALAS-2023-1898
- ALAS2-2023-2376
- ALPINE:CVE-2023-48795
- ALSA-2024:0606
- ALSA-2024:0628
- ALSA-2024:1130
- ALSA-2024:1150
- DSA-5586-1
- DSA-5588-1
- DSA-5591-1
- DSA-5599-1
- DSA-5600-1
- DSA-5601-1
- DSA-5750-1
- ELSA-2024-0606
- ELSA-2024-0628
- ELSA-2024-1130
- ELSA-2024-1150
- ELSA-2024-12157
- ELSA-2024-12158
- ELSA-2024-12164
- ELSA-2024-12232
- ELSA-2024-12233
- ELSA-2024-2988
- FEDORA-2023-0733306be9
- FEDORA-2023-153404713b
- FEDORA-2023-20feb865d8
- FEDORA-2023-55800423a8
- FEDORA-2023-b87ec6cf47
- FEDORA-2023-cb8c606fbb
- FEDORA-2023-e77300e4b5
- FEDORA-2024-06ebb70bdd
- FEDORA-2024-2705241461
- FEDORA-2024-37627e432e
- FEDORA-2024-39a8c72ea9
- FEDORA-2024-3bb23c77f3
- FEDORA-2024-3fd1bc9276
- FEDORA-2024-71c2c6526c
- FEDORA-2024-7b08207cdb
- FEDORA-2024-7e301327c2
- FEDORA-2024-a53b24023d
- FEDORA-2024-ae653fb07b
- FEDORA-2024-d946b9ad25
- FEDORA-2024-fb32950d11
- FREEBSD:0F7598CC-9FE2-11EE-B47F-901B0E9408DC
- FREEBSD:13D83980-9F18-11EE-8E38-002590C1F29C
- FREEBSD:4EBDD56B-FE72-11EE-BC57-00E081B7AA2D
- FREEBSD:91955195-9EBB-11EE-BC14-A703705DB3A6
- FREEBSD:B5E22EC5-BC4B-11EE-B0B5-B42E991FC52E
- GLSA-202312-16
- GLSA-202312-17
- GLSA-202407-11
- GLSA-202407-12
- GO-2023-2402
- JENKINS:SECURITY-3333
- JENKINS:SECURITY-3386
- openSUSE-SU-2023:0411-1
- openSUSE-SU-2023:0421-1
- openSUSE-SU-2024:0005-1
- openSUSE-SU-2024:0008-1
- openSUSE-SU-2024:0036-1
- RHBA-2024:1127
- RHBA-2024:1136
- RHSA-2024:0606
- RHSA-2024:0628
- RHSA-2024:1130
- RHSA-2024:1150
- RHSA-2024:2988
- RLSA-2024:0606
- RLSA-2024:0628
- SSA:2023-353-01
- SUSE-SU-2023:4902-1
- SUSE-SU-2023:4903-1
- SUSE-SU-2023:4904-1
- SUSE-SU-2023:4905-1
- SUSE-SU-2023:4946-1
- SUSE-SU-2024:0006-1
- SUSE-SU-2024:0035-1
- SUSE-SU-2024:0140-1
- SUSE-SU-2024:0210-1
- SUSE-SU-2024:0224-1
- SUSE-SU-2024:0327-1
- SUSE-SU-2024:0430-1
- SUSE-SU-2024:0460-1
- SUSE-SU-2024:0525-1
- SUSE-SU-2024:0539-1
- SUSE-SU-2024:0543-1
- SUSE-SU-2024:0558-1
- SUSE-SU-2024:0972-1
- SUSE-SU-2024:0974-1
- USN-6560-1
- USN-6560-2
- USN-6561-1
- USN-6585-1
- USN-6589-1
- USN-6598-1
- USN-6738-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:slackbuild/slackware/proftpd?arch=x86_64&distro=slackware64-current | slackware | proftpd | < 1.3.8b | slackware64-current | x86_64 | |
Affected | pkg:slackbuild/slackware/proftpd?arch=x86_64&distro=slackware64-15.0 | slackware | proftpd | < 1.3.8b | slackware64-15.0 | x86_64 | |
Affected | pkg:slackbuild/slackware/proftpd?arch=x86_64&distro=slackware64-14.2 | slackware | proftpd | < 1.3.8b | slackware64-14.2 | x86_64 | |
Affected | pkg:slackbuild/slackware/proftpd?arch=x86_64&distro=slackware64-14.1 | slackware | proftpd | < 1.3.8b | slackware64-14.1 | x86_64 | |
Affected | pkg:slackbuild/slackware/proftpd?arch=x86_64&distro=slackware64-14.0 | slackware | proftpd | < 1.3.8b | slackware64-14.0 | x86_64 | |
Affected | pkg:slackbuild/slackware/proftpd?arch=i586&distro=slackware-current | slackware | proftpd | < 1.3.8b | slackware-current | i586 | |
Affected | pkg:slackbuild/slackware/proftpd?arch=i586&distro=slackware-15.0 | slackware | proftpd | < 1.3.8b | slackware-15.0 | i586 | |
Affected | pkg:slackbuild/slackware/proftpd?arch=i586&distro=slackware-14.2 | slackware | proftpd | < 1.3.8b | slackware-14.2 | i586 | |
Affected | pkg:slackbuild/slackware/proftpd?arch=i486&distro=slackware-14.1 | slackware | proftpd | < 1.3.8b | slackware-14.1 | i486 | |
Affected | pkg:slackbuild/slackware/proftpd?arch=i486&distro=slackware-14.0 | slackware | proftpd | < 1.3.8b | slackware-14.0 | i486 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |