[Bug 1462311] Re: proftpd mod_copy issue (CVE-2015-3306)

Ubuntu Foundations Team Bug Bot 1462311 at bugs.launchpad.net
Sun Dec 4 04:24:48 UTC 2016


The attachment "Upstream patch applied for trusty" seems to be a
debdiff.  The ubuntu-sponsors team has been subscribed to the bug report
so that they can review and hopefully sponsor the debdiff.  If the
attachment isn't a patch, please remove the "patch" flag from the
attachment, remove the "patch" tag, and if you are member of the
~ubuntu-sponsors, unsubscribe the team.

[This is an automated message performed by a Launchpad user owned by
~brian-murray, for any issue please contact him.]

** Tags added: patch

-- 
You received this bug notification because you are a member of ProFTPD
Maintainance Team, which is subscribed to proftpd-dfsg in Ubuntu.
https://bugs.launchpad.net/bugs/1462311

Title:
  proftpd mod_copy issue (CVE-2015-3306)

Status in Proftpd Dfsg:
  Fix Released
Status in proftpd-dfsg package in Ubuntu:
  Confirmed

Bug description:
  The CVE-2015-3306 problem is arround for some time now and is not fixed in 12.04 and 14.04 LTS versions.
  http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3306.html

  I also tested it with telnet.
  I can copy files without any authentication if mod_copy is enabled (mod_copy is per default enabled!)
  The module is very usefull. I would be happy if I can re enable it on my servers.

  Debian and other distributions have already fix this in their systems.
  http://bugs.proftpd.org/show_bug.cgi?id=4169
  https://security-tracker.debian.org/tracker/CVE-2015-3306
  https://www.debian.org/security/2015/dsa-3263

  Is there a special reason why this still not fixed on the LTS versions
  of Ubuntu?

To manage notifications about this bug go to:
https://bugs.launchpad.net/proftpd-dfsg/+bug/1462311/+subscriptions



More information about the Pkg-proftpd-maintainers mailing list