** Description changed:

  This bug has been brought to my attention the following:
  
  There is a Debian bug report
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949622
  
- The proftpd-basic package in Xenial and Bionic suffers from this bug.
- The impact is very widespread. Every person that uses Filezilla client
- version greater than 3.46.1 cannot connect to any Ubuntu server using
- this proftpd package due to the bug.
+ The proftpd-basic package suffers from this bug. The impact is very
+ widespread. Every person that uses Filezilla client version greater than
+ 3.46.1 cannot connect to any Ubuntu server using this proftpd package
+ due to the bug.
  
  As you see in the link above, there is a patch for Debian. So is it
  possible that the support team can get this functionality bug and
  security fix implemented in Xenial and Bionic?
- 
  
  
https://github.com/proftpd/proftpd/commit/3d17c8419afb10580b942f392f0a5c6de995c4e2
  
  $ git describe --contains 3d17c8419
  v1.3.7rc3~25^2
  
-  proftpd-basic | 1.3.5a-1ubuntu0.1  | xenial-updates/universe
-  proftpd-basic | 1.3.5e-1build1     | bionic/universe      
-  proftpd-basic | 1.3.6-4            | disco/universe        
-  proftpd-basic | 1.3.6-6build2      | eoan/universe         
-  proftpd-basic | 1.3.6c-2           | focal/universe
- 
+  proftpd-basic | 1.3.5a-1ubuntu0.1  | xenial-updates/universe
+  proftpd-basic | 1.3.5e-1build1     | bionic/universe
+  proftpd-basic | 1.3.6-4            | disco/universe
+  proftpd-basic | 1.3.6-6build2      | eoan/universe
+  proftpd-basic | 1.3.6c-2           | focal/universe
  
  Focal has the patch already:
  ./f/proftpd-dfsg-1.3.6c/debian/patches/upstream_4385
  
  Reference:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949622
  http://bugs.proftpd.org/show_bug.cgi?id=4385

** Description changed:

  This bug has been brought to my attention the following:
  
  There is a Debian bug report
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949622
  
  The proftpd-basic package suffers from this bug. The impact is very
  widespread. Every person that uses Filezilla client version greater than
  3.46.1 cannot connect to any Ubuntu server using this proftpd package
  due to the bug.
  
  As you see in the link above, there is a patch for Debian. So is it
  possible that the support team can get this functionality bug and
  security fix implemented in Xenial and Bionic?
  
  
https://github.com/proftpd/proftpd/commit/3d17c8419afb10580b942f392f0a5c6de995c4e2
  
+ # Proftpd
  $ git describe --contains 3d17c8419
  v1.3.7rc3~25^2
  
   proftpd-basic | 1.3.5a-1ubuntu0.1  | xenial-updates/universe
   proftpd-basic | 1.3.5e-1build1     | bionic/universe
   proftpd-basic | 1.3.6-4            | disco/universe
   proftpd-basic | 1.3.6-6build2      | eoan/universe
   proftpd-basic | 1.3.6c-2           | focal/universe
  
  Focal has the patch already:
  ./f/proftpd-dfsg-1.3.6c/debian/patches/upstream_4385
  
+ # Filezilla
+  filezilla | 3.28.0-1          | bionic/universe  
+  filezilla | 3.39.0-2          | disco/universe   
+  filezilla | 3.39.0-2          | eoan/universe    
+  filezilla | 3.46.3-1build1    | focal/universe
+ 
  Reference:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949622
  http://bugs.proftpd.org/show_bug.cgi?id=4385

** Description changed:

  This bug has been brought to my attention the following:
  
  There is a Debian bug report
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949622
  
  The proftpd-basic package suffers from this bug. The impact is very
  widespread. Every person that uses Filezilla client version greater than
  3.46.1 cannot connect to any Ubuntu server using this proftpd package
  due to the bug.
  
  As you see in the link above, there is a patch for Debian. So is it
  possible that the support team can get this functionality bug and
  security fix implemented in Xenial and Bionic?
  
  
https://github.com/proftpd/proftpd/commit/3d17c8419afb10580b942f392f0a5c6de995c4e2
  
  # Proftpd
  $ git describe --contains 3d17c8419
  v1.3.7rc3~25^2
  
   proftpd-basic | 1.3.5a-1ubuntu0.1  | xenial-updates/universe
   proftpd-basic | 1.3.5e-1build1     | bionic/universe
   proftpd-basic | 1.3.6-4            | disco/universe
   proftpd-basic | 1.3.6-6build2      | eoan/universe
   proftpd-basic | 1.3.6c-2           | focal/universe
  
  Focal has the patch already:
  ./f/proftpd-dfsg-1.3.6c/debian/patches/upstream_4385
  
  # Filezilla
+  filezilla | 3.15.0.2-1ubuntu1 | xenial/universe  
   filezilla | 3.28.0-1          | bionic/universe  
   filezilla | 3.39.0-2          | disco/universe   
   filezilla | 3.39.0-2          | eoan/universe    
-  filezilla | 3.46.3-1build1    | focal/universe
+  filezilla | 3.46.3-1build1    | focal/universe 
  
  Reference:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949622
  http://bugs.proftpd.org/show_bug.cgi?id=4385

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1870555

Title:
  SSH authentication fails for many clients due to receiving of
  SSH_MSG_IGNORE packet

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/proftpd/+bug/1870555/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to