Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

proftpd-1.3.6e-1.7 RPM for armv6hl

From OpenSuSE Ports Tumbleweed for armv6hl

Name: proftpd Distribution: openSUSE Tumbleweed
Version: 1.3.6e Vendor: openSUSE
Release: 1.7 Build date: Sun Sep 5 10:23:21 2021
Group: Productivity/Networking/Ftp/Servers Build host: obs-arm-10
Size: 6671706 Source RPM: proftpd-1.3.6e-1.7.src.rpm
Summary: Configurable GPL-licensed FTP server software
ProFTPD is a configurable FTP daemon for Unix and Unix-like
operating systems.






* Thu Nov 19 2020 Dominique Leuenberger <>
  - Update to version 1.3.6e:
    + Invalid SCP command leads to null pointer dereference.
  - Do not limit to openSSL < 1.1: proftpd has had support for
    openSSL 1.1 sice version 1.3.6a.
  - Rebase proftpd-no_BuildDate.patch.
* Fri Jun 05 2020
  - update to 1.3.6d
    * Issue 857 - Fixed regression in the handling of `%{env:...}` configuration
      variables when the environment variable is not present.
    * Issue 940 - Second LIST of the same symlink shows different results.
    * Issue 959 - FTPS uploads using TLSv1.3 are likely to fail unexpectedly.
    * Issue 980 - mod_sftp sends broken response when CREATETIME attribute is
    * Bug 4398 - Handle zero-length SFTP WRITE requests without error.
    * Issue 1018 - PidFile should not be world-writable.
    * Issue 1014 - TLSv1.3 handshake fails due to missing session ticket key on
      some systems.
    * Issue 1023 - Lowercased FTP commands not properly identified.
  - rebase proftpd-no_BuildDate.patch
* Mon Feb 24 2020
  - fix for boo#1164572 (CVE-2020-9272, gh#902)
  - fix for boo#1164574 (CVE-2020-9273, gh#903)
  - update to 1.3.6c
    * Fixed regression in directory listing latency (Issue #863).
    * Detect OpenSSH-specific formatted SFTPHostKeys, and log hint for
      converting them to supported format.
    * Fixed use-after-free vulnerability during data transfers (Issue #903).
    * Fixed out-of-bounds read in mod_cap by updating the bundled libcap
      (Issue #902).
  - remove obsolete proftpd-tls-crls-issue859.patch
  - rebase patches
    * proftpd-ftpasswd.patch
    * proftpd-no_BuildDate.patch
    * proftpd_env-script-interpreter.patch
* Sat Feb 01 2020
  - cleanup tls.template
    * remove deprecated NoCertRequest from TLSOptions
* Sat Dec 28 2019
  - fix changes file
    * add missing info about boo#1155834
    * add missing info about boo#1154600
  - fix for boo#1156210
    * GeoIP has been discontinued by Maxmind
    * remove module build for geoip
  - fix for boo#1157803 (CVE-2019-19269), boo#1157798 (CVE-2019-19270)
    * add upstream patch proftpd-tls-crls-issue859.patch
* Sun Nov 03 2019
  - fix for boo#1154600 (CVE-2019-18217, gh#846)
  - update to 1.3.6b
    * Fixed pre-authentication remote denial-of-service issue (Issue #846).
    * Backported fix for building mod_sql_mysql using MySQL 8 (Issue #824).
  - update to 1.3.6a
    * Fixed symlink navigation (Bug#4332).
    * Fixed building of mod_sftp using OpenSSL 1.1.x releases (Issue#674).
    * Fixed SITE COPY honoring of <Limit> restrictions (Bug#4372).
    * Fixed segfault on login when using mod_sftp + mod_sftp_pam (Issue#656).
    * Fixed restarts when using mod_facl as a static module
  - remove obsolete proftpd-CVE-2019-12815.patch
    * included in 1.3.6a (Bug#4372)
  - add proftpd_env-script-interpreter.patch
    * RPMLINT fix for env-script-interpreter (Badness: 9)
* Sat Nov 02 2019 Martin Hauke <>
  - fix for boo#1155834
    * Add missing Requires(pre): group(ftp) for Leap 15 and Tumbleweed
    * Add missing Requires(pre): user(ftp) for Leap 15 and Tumbleweed
* Wed Oct 02 2019 Bernhard Wiedemann <>
  - Update proftpd-dist.patch to use (boo#1144056)
* Fri Aug 02 2019
  - fix for boo#1142281 (CVE-2019-12815, bpo#4372)
    arbitrary file copy in mod_copy allows for remote code execution
    and information disclosure without authentication
  - add patch
    * proftpd-CVE-2019-12815.patch
      taken from:
* Mon Jul 01 2019
  - update changes file
    * add missing info about bugzilla 1113041
* Tue Mar 26 2019 Jan Engelhardt <>
  - Fix the Factory build: select the appropriate OpenSSL version
    to build with. (fix for boo#1113041)
* Wed Mar 20 2019 Jan Engelhardt <>
  - Reduce hard dependency on systemd to only that which is
    necessary for building and installation.
  - Modernize RPM macro use (%make_install, %tmpfiles_create).
  - Strip emphasis from description and trim other platform mentions.
* Wed Jul 11 2018
  - update to 1.3.6
    * Support for using Redis for caching, logging; see the doc/howto/Redis.html
    * Fixed mod_sql_postgres SSL support (Issue #415).
    * Support building against LibreSSL instead of OpenSSL (Issue #361).
    * Better support on AIX for login restraictions (Bug #4285).
    * TimeoutLogin (and other timeouts) were not working properly for SFTP
      connections (Bug#4299).
    * Handling of the SIGILL and SIGINT signals, by the daemon process, now causes
      the child processes to be terminated as well (Issue #461).
    * RPM .spec file naming changed to conform to Fedora guidelines.
    * Fix for "AllowChrootSymlinks off" checking each component for symlinks
    - New Modules:
    * mod_redis, mod_tls_redis, mod_wrap2_redis
      With Redis now supported as a caching mechanism, similar to Memcache,
      there are now Redis-using modules: mod_redis (for configuring the Redis
      connection information), mod_tls_redis (for caching SSL sessions and
      OCSP information using Redis), and mod_wrap2_redis (for using ACLs stored
      in Redis).
    - Changed Modules:
    * mod_ban
      The mod_ban module's BanCache directive can now use Redis-based caching;
      see doc/contrib/mod_ban.html#BanCache.
    - New Configuration Directives
    * SQLPasswordArgon2, SQLPasswordScrypt
      The key lengths for Argon2 and Scrypt-based passwords are now configurable
      via these new directives; previously, the key length had been hardcoded
      to be 32 bytes, which is not interoperable with all other implementations
      (Issue #454).
    - Changed Configuration Directives
    * AllowChrootSymlinks
      When "AllowChrootSymlinks off" was used, only the last portion of the
      DefaultRoot path would be checked to see if it was a symlink.  Now,
      each component of the DefaultRoot path will be checked to see if it is
      a symlink when "AllowChrootSymlinks off" is used.
    * Include
      The Include directive can now be used within a <Limit> section, e.g.:
      <Limit LOGIN>
      Include /path/to/allowed.txt
    - API Changes
    * A new JSON API has been added, for use by third-party modules.
  - remove obsolete proftpd_include-in-limit-section.patch
  - rebase patches
    * proftpd-ftpasswd.patch
    * proftpd-no_BuildDate.patch
* Tue Jul 10 2018
  - update to 1.3.5e
    * Fixed SFTP issue with digest/MAC.
    * Fixed regression with mod_sftp rekeying.
    * Backported fix for "AllowChrootSymlinks off" checking each component
      for symlinks (CVE-2017-7418).
  - remove obsolete patch
    * proftpd-AllowChrootSymlinks.patch (now included)
  - rebase patches
    * proftpd-dist.patch
    * proftpd-no_BuildDate.patch
    * proftpd_include-in-limit-section.patch



Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Oct 12 23:41:34 2021