Hide Forgot
Vadim Melihow reported a critical issue with proftpd installations that use the mod_copy module's SITE CPFR/SITE CPTO commands; mod_copy allows these commands to be used by *unauthenticated clients*: http://bugs.proftpd.org/show_bug.cgi?id=4169 Upstream fix: https://github.com/proftpd/proftpd/pull/109
Created proftpd tracking bugs for this issue: Affects: fedora-all [bug 1212388] Affects: epel-all [bug 1212389]
proftpd-1.3.5-6.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
proftpd-1.3.4e-3.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
proftpd-1.3.5-5.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
proftpd-1.3.5-5.el7 has been pushed to the Fedora EPEL 7 stable repository. If problems still persist, please make note of it in this bug report.
Issue now addressed where necessary in all current Fedora and EPEL releases.
Is RHEL 6 not considered a current release? I see updates for fedora 20-22 and epel 7 but nothing on epel 6
(In reply to Carl Thompson from comment #7) > Is RHEL 6 not considered a current release? It is, but as mentioned in Bug #1212389, EPEL-5 and EPEL-6 have an older version of proftpd that did not ship with mod_copy, and are hence not affected by this issue.