[SSA:2023-354-01] proftpd

Severity Medium
Affected Packages 10
CVEs 1

New proftpd packages are available for Slackware 14.0, 14.1, 14.2, 15.0,
and -current to fix a security issue.

Here are the details from the Slackware 15.0 ChangeLog

patches/packages/proftpd-1.3.8b-i586-1_slack15.0.txz: Upgraded.
This update fixes a security issue:
mod_sftp: implemented mitigations for "Terrapin" SSH attack.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-48795
(* Security fix *)

Where to find the new packages

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/proftpd-1.3.8b-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/proftpd-1.3.8b-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/proftpd-1.3.8b-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/proftpd-1.3.8b-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/proftpd-1.3.8b-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/proftpd-1.3.8b-x86_64-1_slack14.2.txz

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/proftpd-1.3.8b-i586-1_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/proftpd-1.3.8b-x86_64-1_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/proftpd-1.3.8b-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/proftpd-1.3.8b-x86_64-1.txz

MD5 signatures

Slackware 14.0 package:
79ebaf263d088d62cf7b0897e3908e79 proftpd-1.3.8b-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
c0e6a80bc274087fe9f738bd52c4ae5b proftpd-1.3.8b-x86_64-1_slack14.0.txz

Slackware 14.1 package:
0622b22327bf55b71a5f136eafbbffbd proftpd-1.3.8b-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
718ea14965856be15d8dad5d730e28fd proftpd-1.3.8b-x86_64-1_slack14.1.txz

Slackware 14.2 package:
af54155ff2e9a9d5cb2caefb24f5fb95 proftpd-1.3.8b-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
192ced161307e17ad8e693408488d88e proftpd-1.3.8b-x86_64-1_slack14.2.txz

Slackware 15.0 package:
d459babbab7447215e65577a847b0eeb proftpd-1.3.8b-i586-1_slack15.0.txz

Slackware x86_64 15.0 package:
603638e2b7ca0db3f4463a73525ee2a5 proftpd-1.3.8b-x86_64-1_slack15.0.txz

Slackware -current package:
9bf202802b1fdf70e3cdeff86a89ef09 n/proftpd-1.3.8b-i586-1.txz

Slackware x86_64 -current package:
dfbbc5d28742b30770b35a36db8e2763 n/proftpd-1.3.8b-x86_64-1.txz

Installation instructions

Upgrade the package as root:
# upgradepkg proftpd-1.3.8b-i586-1_slack15.0.txz

ID
SSA:2023-354-01
Severity
medium
Severity from
CVE-2023-48795
URL
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2023&m=slackware-security.462318
Published
2023-12-20T21:14:12
(9 months ago)
Modified
2023-12-20T21:14:12
(9 months ago)
Rights
Slackware Linux Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:slackbuild/slackware/proftpd?arch=x86_64&distro=slackware64-current slackware proftpd < 1.3.8b slackware64-current x86_64
Affected pkg:slackbuild/slackware/proftpd?arch=x86_64&distro=slackware64-15.0 slackware proftpd < 1.3.8b slackware64-15.0 x86_64
Affected pkg:slackbuild/slackware/proftpd?arch=x86_64&distro=slackware64-14.2 slackware proftpd < 1.3.8b slackware64-14.2 x86_64
Affected pkg:slackbuild/slackware/proftpd?arch=x86_64&distro=slackware64-14.1 slackware proftpd < 1.3.8b slackware64-14.1 x86_64
Affected pkg:slackbuild/slackware/proftpd?arch=x86_64&distro=slackware64-14.0 slackware proftpd < 1.3.8b slackware64-14.0 x86_64
Affected pkg:slackbuild/slackware/proftpd?arch=i586&distro=slackware-current slackware proftpd < 1.3.8b slackware-current i586
Affected pkg:slackbuild/slackware/proftpd?arch=i586&distro=slackware-15.0 slackware proftpd < 1.3.8b slackware-15.0 i586
Affected pkg:slackbuild/slackware/proftpd?arch=i586&distro=slackware-14.2 slackware proftpd < 1.3.8b slackware-14.2 i586
Affected pkg:slackbuild/slackware/proftpd?arch=i486&distro=slackware-14.1 slackware proftpd < 1.3.8b slackware-14.1 i486
Affected pkg:slackbuild/slackware/proftpd?arch=i486&distro=slackware-14.0 slackware proftpd < 1.3.8b slackware-14.0 i486
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...