CVE-2020-9273

NameCVE-2020-9273
DescriptionIn ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2115-1, DLA-2115-2, DSA-4635-1
Debian Bugs951800

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
proftpd-dfsg (PTS)bullseye1.3.7a+dfsg-12+deb11u2fixed
bullseye (security)1.3.7a+dfsg-12+deb11u3fixed
bookworm1.3.8+dfsg-4+deb12u3fixed
bookworm (security)1.3.8+dfsg-4+deb12u4fixed
trixie1.3.8.b+dfsg-4fixed
sid1.3.8.c+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
proftpd-dfsgsourcejessie1.3.5e+r1.3.5-2+deb8u7DLA-2115-2
proftpd-dfsgsourcestretch1.3.5b-4+deb9u4DSA-4635-1
proftpd-dfsgsourcebuster1.3.6-4+deb10u4DSA-4635-1
proftpd-dfsgsource(unstable)1.3.6c-2951800

Notes

https://github.com/proftpd/proftpd/issues/903
https://github.com/proftpd/proftpd/commit/d388f7904d4c9a6d0ea54237b8b54a57c19d8d49 (master)
https://github.com/proftpd/proftpd/commit/f8047a1ed0e0eb15193f555c4cbbb281e705c5c3 (master)
https://github.com/proftpd/proftpd/commit/e845abc1bd86eebec7a0342fded908a1b0f1996b (1.3.6c)
https://github.com/proftpd/proftpd/commit/cd9036f4ef7a05c107f0ffcb19a018b20267c531 (1.3.6-branch)

Search for package or bug name: Reporting problems