Bug 17960 - proftpd new security issue CVE-2016-3125
Summary: proftpd new security issue CVE-2016-3125
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/680795/
Whiteboard: advisory MGA5-32-OK MGA5-64-OK
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2016-03-11 20:44 CET by David Walser
Modified: 2016-03-31 22:23 CEST (History)
5 users (show)

See Also:
Source RPM: proftpd-1.3.5-5.1.mga5.src.rpm
CVE: CVE-2016-3125
Status comment:


Attachments

Description David Walser 2016-03-11 20:44:43 CET
A CVE has been assigned for a security issue in proftpd's mod_tls in 1.3.5b:
http://openwall.com/lists/oss-security/2016/03/11/14

The upstream patch doesn't apply cleanly to 1.3.5.  We'll have to see if someone backports it, or we'll have to update to 1.3.5b (already done in Cauldron).
Comment 1 David Walser 2016-03-21 17:35:01 CET
Fedora has issued an advisory for this on March 20:
https://lists.fedoraproject.org/pipermail/package-announce/2016-March/179143.html
David Walser 2016-03-21 18:50:58 CET

URL: (none) => http://lwn.net/Vulnerabilities/680795/

Comment 2 Marja Van Waes 2016-03-28 22:25:58 CEST
Assigning to all packagers collectively, since there is no maintainer for this package.

CC: (none) => marja11
Assignee: bugsquad => pkg-bugs

Comment 3 José Jorge 2016-03-30 17:28:30 CEST
I agree the update to 1.3.5b . David, I can do that if you want...

Status: NEW => ASSIGNED
CC: (none) => lists.jjorge

Comment 4 David Walser 2016-03-30 17:29:25 CEST
(In reply to José Jorge from comment #3)
> I agree the update to 1.3.5b . David, I can do that if you want...

Please do.  Thanks.
Comment 5 José Jorge 2016-03-30 18:12:48 CEST
I have uploaded a 1.3.5b package for Mageia 5.

You can test this by connecting by ftp to localhost ;-)

Suggested advisory:
========================

Updated proftpd packages fix security vulnerabilities: a CVE has been assigned for a security issue in proftpd's mod_tls .


This update also brings as bonus other bugfixes of 1.3.5b version :
  + SSH RSA hostkeys smaller than 2048 bits now work properly.
  + MLSD response lines are now properly CRLF terminated.
  + Fixed selection of DH groups from TLSDHParamFile.


References:
http://openwall.com/lists/oss-security/2016/03/11/14
http://www.proftpd.org/docs/RELEASE_NOTES-1.3.5b
========================

Updated packages in {core,tainted}/updates_testing:
========================
proftpd-1.3.5b-1.mga5
proftpd-mod{*}1.3.5b-1.mga5
proftpd-devel-1.3.5b-1.mga5


Source RPMs: 
proftpd-1.3.5b-1.mga5
José Jorge 2016-03-30 18:13:23 CEST

Assignee: pkg-bugs => qa-bugs

José Jorge 2016-03-30 18:13:54 CEST

CVE: (none) => CVE-2016-3125

Comment 6 David Walser 2016-03-30 18:19:19 CEST
Thanks Jóse!

Suggested advisory:
========================

Updated proftpd packages fix security vulnerability:

A bug with security implications was found in the mod_tls module in ProFTPD
before 1.3.5b. This module has a configuration option TLSDHParamFile to specify
user-defined Diffie Hellman parameters. The software would ignore the
user-defined parameters and use Diffie Hellman key exchanges with 1024 bits
(CVE-2016-3125).

The proftpd package has been updated to version 1.3.5b, which fixes this issue
and other bugs, including:
- SSH RSA hostkeys smaller than 2048 bits now work properly.
- MLSD response lines are now properly CRLF terminated.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3125
http://www.proftpd.org/docs/RELEASE_NOTES-1.3.5b
https://lists.fedoraproject.org/pipermail/package-announce/2016-March/179143.html
Dave Hodgins 2016-03-31 19:20:19 CEST

CC: (none) => davidwhodgins
Whiteboard: (none) => advisory

Comment 7 William Kenney 2016-03-31 19:46:54 CEST
In VirtualBox, M5, KDE, 32-bit

default install of proftpd

[root@localhost wilcal]# urpmi proftpd
Package proftpd-1.3.5-5.1.mga5.i586 is already installed

accessing localhost using filezilla works
accessing Vbox client from another system on the LAN w/filezilla works

install proftpd from updates_testing

[root@localhost wilcal]# urpmi proftpd
Package proftpd-1.3.5b-1.mga5.i586 is already installed

accessing localhost using filezilla works
accessing Vbox client from another system on the LAN w/filezilla works

CC: (none) => wilcal.int
Whiteboard: advisory => advisory MGA5-32-OK

Comment 8 William Kenney 2016-03-31 20:02:04 CEST
In VirtualBox, M5, KDE, 64-bit

default install of proftpd

[root@localhost wilcal]# urpmi proftpd
Package proftpd-1.3.5-5.1.mga5.x86_64 is already installed

accessing localhost using filezilla works
accessing Vbox client from another system on the LAN w/filezilla works

install proftpd from updates_testing

[root@localhost wilcal]# urpmi proftpd
Package proftpd-1.3.5b-1.mga5.x86_64 is already installed

accessing localhost using filezilla works
accessing Vbox client from another system on the LAN w/filezilla works

Whiteboard: advisory MGA5-32-OK => advisory MGA5-32-OK MGA5-64-OK

Comment 9 William Kenney 2016-03-31 20:02:29 CEST
This looks good to go. What you say David?
Comment 10 David Walser 2016-03-31 20:03:25 CEST
Yes, thanks William.
Comment 11 William Kenney 2016-03-31 20:37:13 CEST
This update works fine.
Testing complete for MGA5, 32-bit & 64-bit
Validating the update.
Could someone from the sysadmin team push to updates.
Thanks

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 12 Mageia Robot 2016-03-31 22:23:24 CEST
An update for this issue has been pushed to the Mageia Updates repository.

http://advisories.mageia.org/MGASA-2016-0128.html

Status: ASSIGNED => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.