Bug 2041803 (CVE-2021-40524)

Summary: CVE-2021-40524 pure-ftpd: unbounded file size in file upload
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: alain.vigne.14
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-01-18 11:01:09 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2041804, 2041805    
Bug Blocks:    

Description Dhananjay Arunesh 2022-01-18 10:19:37 UTC
In Pure-FTPd before 1.0.50, an incorrect max_filesize quota mechanism in the server allows attackers to upload files of unbounded size, which may lead to denial of service or a server hang. This occurs because a certain greater-than-zero test does not anticipate an initial -1 value. (Versions 1.0.23 through 1.0.49 are affected.)

References:
https://github.com/jedisct1/pure-ftpd/pull/158
https://github.com/jedisct1/pure-ftpd/commit/37ad222868e52271905b94afea4fc780d83294b4
https://github.com/jedisct1/pure-ftpd/compare/1.0.49...1.0.50

Comment 1 Dhananjay Arunesh 2022-01-18 10:19:57 UTC
Created gerbv tracking bugs for this issue:

Affects: epel-all [bug 2041805]
Affects: fedora-all [bug 2041804]

Comment 2 Product Security DevOps Team 2022-01-18 11:01:06 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.