CVE-2020-9272

NameCVE-2020-9272
DescriptionProFTPD 1.3.7 has an out-of-bounds (OOB) read vulnerability in mod_cap via the cap_text.c cap_to_text function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
proftpd-dfsg (PTS)jessie, jessie (lts)1.3.5e+r1.3.5-2+deb8u8vulnerable
stretch (security)1.3.5e+r1.3.5b-4+deb9u2vulnerable
stretch (lts), stretch1.3.5e+r1.3.5b-4+deb9u3vulnerable
buster1.3.6-4+deb10u6vulnerable
buster (security), buster (lts)1.3.6-4+deb10u4vulnerable
bullseye1.3.7a+dfsg-12+deb11u2fixed
bookworm1.3.8+dfsg-4+deb12u3fixed
sid, trixie1.3.8.b+dfsg-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
proftpd-dfsgsource(unstable)1.3.6c-1unimportant

Notes

https://github.com/proftpd/proftpd/issues/902
Debian does not build mod_cap and does not use the embedded libcap.
Sourcewise fixed in 1.3.6c by updating to the lastest libcap.

Search for package or bug name: Reporting problems