Vulnerability from csaf_suse
Published
2022-03-24 11:04
Modified
2022-03-24 11:04
Summary
Recommended update for vsftpd

Notes

Title of the patch
Recommended update for vsftpd
Description of the patch
This update for vsftpd fixes the following issues: This update enables vsftpd to speak TLS 1.3 in ssl FTP mode by linking against openssl 1.1.1. Bugfixes added: - Fixed a seccomp failure in FIPS mode when SSL was enabled. [bsc#1052900] - allow stat() to be called, which is required during SSL initialization by RAND_load_file(). - allow wait4() to be called so that the broker can wait for its child processes. [bsc#1021387] - Revert the 'ssl_tlsv1_X'-style config file options back to their original spelling. The changes that dropped the underscore from the version numbers in release 3.0.4 breaks existing configurations and it was never documented anywhere -- not in the package's changelog and not in the packages's own man page. - vsftpd follows the system-wide TLS cipher policy 'DEFAULT_SUSE' by default. Run the command 'openssl ciphers -v DEFAULT_SUSE' to see which ciphers this includes. - allow sendto() syscall when /dev/log support is enabled. [bsc#786024] - allow sendto() to be called from check_limits(), which is necessary for vsftpd to write to the system log. - Added hardening to systemd service(s) (bsc#1181400). Update to version 3.0.5: * Fix ALPN callback to correctly select the 'ftp' string if present. Works with FileZilla-3.55.0. * Fix a couple of seccomp policy issues with Fedora 34. Update to version 3.0.4. * Fix runtime SIGSYS crashes (seccomp sandbox policy tweaks). * Reject HTTP verbs pre-login. * Disable TLS prior to v1.2 by default. * Close the control connection after 10 unknown commands pre-login. * Reject any TLS ALPN advertisement that's not 'ftp'. * Add ssl_sni_hostname option to require a match on incoming SNI hostname. * The options 'ssl_tlsv1_1', 'ssl_tlsv1_2', and 'ssl_tlsv1_3' have been renamed to 'ssl_tlsv11', 'ssl_tlsv12', and 'ssl_tlsv13' respectively. Note that the man page has not been updated accordingly. - OpenSSL was updated to version 1.1.1 in SLE-15-SP2, adding support for the TLSv1.3 protocol. As a consequence, some SLE-15 applications that link OpenSSL for TLS support -- like vsftpd --, gained the ability to use the newer TLS protocol, which created interoperability problems with FTP clients in some cases. To remedy the situation, '0001-Introduce-TLSv1.3-option.patch' was applied in a forked SLE-15-SP2 version of vsftpd. The patch adds the configuration option 'ssl_tlsv1_3' that system administrators can use to disable TLSv1.3 support on their servers. [bsc#1187188] - allow getdents64 syscall in seccomp sandbox, fixes bsc#1179553 - Add pam_keyinit.so to PAM config file. [bsc#1144062] - Fixed a segmentation fault that occurred while trying to write to an invalid TLS context. [bsc#1125951] - Enable wait4(), sysinfo(), and shutdown() syscalls in seccomp sandbox. These are required for the daemon to work properly on SLE-15. [bsc#1089088, bsc#1180314] - Add firewalld service file (bsc#1083705) - Make sure to also require group nobody and user ftp bsc#1070653 - Fixed interoperability issue with various ftp clients that arose when vsftpd is configured with option 'use_localtime=YES'. Basically, it's fine to use local time stamps in directory listings, but responding to MDTM commands with any time zone other than UTC directly violates RFC3659 and leads FTP clients to misinterpret the file's time stamp. [bsc#1024961] - Conditionally install xinetd service only on older releases * On current distributions we support the same functionality via systemd socket activation - Fix build against OpenSSL 1.1. (bsc#1042673) - Version bump to 3.0.3: * Increase VSFTP_AS_LIMIT to 200MB; various reports. * Make the PWD response more RFC compliant; report from Barry Kelly <barry@modeltwozero.com>. * Remove the trailing period from EPSV response to work around BT Internet issues; report from Tim Bishop <tdb@mirrorservice.org>. * Fix syslog_enable issues vs. seccomp filtering. Report from Michal Vyskocil <mvyskocil@suse.cz>. At least, syslogging seems to work on my Fedora now. * Allow gettimeofday() in the seccomp sandbox. I can't repro failures, but I probably have a different distro / libc / etc. and there are multiple reports. * Some kernels support PR_SET_NO_NEW_PRIVS but not PR_SET_SECCOMP, so handle this case gracefully. Report from Vasily Averin <vvs@odin.com>. * List the TLS1.2 cipher AES128-GCM-SHA256 as first preference by default. * Make some compile-time SSL defaults (such as correct client shutdown handling) stricter. * Disable Nagle algorithm during SSL data connection shutdown, to avoid 200ms delays. From Tim Kosse <tim.kosse@filezilla-project.org>. * Kill the FTP session if we see HTTP protocol commands, to avoid cross-protocol attacks. A report from Jann Horn <jann@thejh.net>. * Kill the FTP session if we see session re-use failure. A report from Tim Kosse <tim.kosse@filezilla-project.org>. * Enable ECDHE, Tim Kosse <tim.kosse@filezilla-project.org>. * Default cipher list is now just ECDHE-RSA-AES256-GCM-SHA384. * Minor SSL logging improvements. * Un-default tunable_strict_ssl_write_shutdown again. We still have tunable_strict_ssl_read_eof defaulted now, which is the important one to prove upload integrity.
Patchnames
SUSE-2022-655,SUSE-SLE-SERVER-12-SP5-2022-655
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "moderate",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "Recommended update for vsftpd",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "This update for vsftpd fixes the following issues:\n\nThis update enables vsftpd to speak TLS 1.3 in ssl FTP mode by linking against openssl 1.1.1.\n\nBugfixes added:\n\n- Fixed a seccomp failure in FIPS mode when SSL was enabled. [bsc#1052900]\n- allow stat() to be called, which is required during SSL initialization by RAND_load_file().\n- allow wait4() to be called so that the broker can wait for its child processes. [bsc#1021387]\n- Revert the 'ssl_tlsv1_X'-style config file options back to their\n  original spelling. The changes that dropped the underscore from\n  the version numbers in release 3.0.4 breaks existing\n  configurations and it was never documented anywhere -- not in the\n  package's changelog and not in the packages's own man page.\n- vsftpd follows the system-wide TLS cipher policy 'DEFAULT_SUSE' by\n  default. Run the command 'openssl ciphers -v DEFAULT_SUSE' to see\n  which ciphers this includes.\n- allow sendto() syscall when /dev/log support is enabled. [bsc#786024]\n- allow sendto() to be called from check_limits(), which is necessary for\n  vsftpd to write to the system log.\n- Added hardening to systemd service(s) (bsc#1181400).\n\nUpdate to version 3.0.5:\n\n* Fix ALPN callback to correctly select the 'ftp' string if present.\n  Works with FileZilla-3.55.0.\n* Fix a couple of seccomp policy issues with Fedora 34.\n\nUpdate to version 3.0.4.\n\n* Fix runtime SIGSYS crashes (seccomp sandbox policy tweaks).\n* Reject HTTP verbs pre-login.\n* Disable TLS prior to v1.2 by default.\n* Close the control connection after 10 unknown commands pre-login.\n* Reject any TLS ALPN advertisement that's not 'ftp'.\n* Add ssl_sni_hostname option to require a match on incoming SNI hostname.\n* The options 'ssl_tlsv1_1', 'ssl_tlsv1_2', and 'ssl_tlsv1_3'\n  have been renamed to 'ssl_tlsv11', 'ssl_tlsv12', and\n  'ssl_tlsv13' respectively. Note that the man page has not been\n  updated accordingly.\n\n- OpenSSL was updated to version 1.1.1 in SLE-15-SP2, adding\n  support for the TLSv1.3 protocol. As a consequence, some SLE-15\n  applications that link OpenSSL for TLS support -- like vsftpd --,\n  gained the ability to use the newer TLS protocol, which created\n  interoperability problems with FTP clients in some cases. To\n  remedy the situation, '0001-Introduce-TLSv1.3-option.patch' was\n  applied in a forked SLE-15-SP2 version of vsftpd. The patch adds\n  the configuration option 'ssl_tlsv1_3' that system administrators\n  can use to disable TLSv1.3 support on their servers.\n  [bsc#1187188]\n\n- allow getdents64 syscall in seccomp sandbox, fixes bsc#1179553\n- Add pam_keyinit.so to PAM config file.  [bsc#1144062]\n- Fixed a segmentation fault that occurred while trying to write to an\n  invalid TLS context. [bsc#1125951]\n- Enable wait4(), sysinfo(), and shutdown() syscalls in seccomp sandbox.\n  These are required for the daemon to work properly on SLE-15. [bsc#1089088,\n  bsc#1180314]\n- Add firewalld service file (bsc#1083705)\n- Make sure to also require group nobody and user ftp bsc#1070653\n- Fixed interoperability issue with various ftp clients that arose when\n  vsftpd is configured with option 'use_localtime=YES'. Basically, it's\n  fine to use local time stamps in directory listings, but responding\n  to MDTM commands with any time zone other than UTC directly violates\n  RFC3659 and leads FTP clients to misinterpret the file's time\n  stamp. [bsc#1024961]\n\n- Conditionally install xinetd service only on older releases\n  * On current distributions we support the same functionality\n    via systemd socket activation\n- Fix build against OpenSSL 1.1.  (bsc#1042673)\n\n- Version bump to 3.0.3:\n\n* Increase VSFTP_AS_LIMIT to 200MB; various reports.\n* Make the PWD response more RFC compliant; report from Barry Kelly\n  <barry@modeltwozero.com>.\n* Remove the trailing period from EPSV response to work around BT Internet\n  issues; report from Tim Bishop <tdb@mirrorservice.org>.\n* Fix syslog_enable issues vs. seccomp filtering. Report from Michal Vyskocil\n  <mvyskocil@suse.cz>. At least, syslogging seems to work on my Fedora now.\n* Allow gettimeofday() in the seccomp sandbox. I can't repro failures, but I\n  probably have a different distro / libc / etc. and there are multiple reports.\n* Some kernels support PR_SET_NO_NEW_PRIVS but not PR_SET_SECCOMP, so handle\n  this case gracefully. Report from Vasily Averin <vvs@odin.com>.\n* List the TLS1.2 cipher AES128-GCM-SHA256 as first preference by default.\n* Make some compile-time SSL defaults (such as correct client shutdown\n  handling) stricter.\n* Disable Nagle algorithm during SSL data connection shutdown, to avoid 200ms\n  delays. From Tim Kosse <tim.kosse@filezilla-project.org>.\n* Kill the FTP session if we see HTTP protocol commands, to avoid\n  cross-protocol attacks. A report from Jann Horn <jann@thejh.net>.\n* Kill the FTP session if we see session re-use failure. A report from\n  Tim Kosse <tim.kosse@filezilla-project.org>.\n* Enable ECDHE, Tim Kosse <tim.kosse@filezilla-project.org>.\n* Default cipher list is now just ECDHE-RSA-AES256-GCM-SHA384.\n* Minor SSL logging improvements.\n* Un-default tunable_strict_ssl_write_shutdown again. We still have\n  tunable_strict_ssl_read_eof defaulted now, which is the important one to prove\n  upload integrity.\n",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "SUSE-2022-655,SUSE-SLE-SERVER-12-SP5-2022-655",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/suse-ru-2022_0655-1.json",
         },
         {
            category: "self",
            summary: "URL for SUSE-RU-2022:0655-1",
            url: "https://www.suse.com/support/update/announcement//suse-ru-20220655-1/",
         },
         {
            category: "self",
            summary: "E-Mail link for SUSE-RU-2022:0655-1",
            url: "https://lists.suse.com/pipermail/sle-updates/2022-March/021907.html",
         },
         {
            category: "self",
            summary: "SUSE Bug 1042673",
            url: "https://bugzilla.suse.com/1042673",
         },
         {
            category: "self",
            summary: "SUSE Bug 1070653",
            url: "https://bugzilla.suse.com/1070653",
         },
         {
            category: "self",
            summary: "SUSE Bug 1083705",
            url: "https://bugzilla.suse.com/1083705",
         },
         {
            category: "self",
            summary: "SUSE Bug 1089088",
            url: "https://bugzilla.suse.com/1089088",
         },
         {
            category: "self",
            summary: "SUSE Bug 1125951",
            url: "https://bugzilla.suse.com/1125951",
         },
         {
            category: "self",
            summary: "SUSE Bug 1144062",
            url: "https://bugzilla.suse.com/1144062",
         },
         {
            category: "self",
            summary: "SUSE Bug 1179553",
            url: "https://bugzilla.suse.com/1179553",
         },
         {
            category: "self",
            summary: "SUSE Bug 1180314",
            url: "https://bugzilla.suse.com/1180314",
         },
         {
            category: "self",
            summary: "SUSE Bug 1181400",
            url: "https://bugzilla.suse.com/1181400",
         },
         {
            category: "self",
            summary: "SUSE Bug 1187188",
            url: "https://bugzilla.suse.com/1187188",
         },
         {
            category: "self",
            summary: "SUSE Bug 1187686",
            url: "https://bugzilla.suse.com/1187686",
         },
         {
            category: "self",
            summary: "SUSE Bug 786024",
            url: "https://bugzilla.suse.com/786024",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-3618 page",
            url: "https://www.suse.com/security/cve/CVE-2021-3618/",
         },
      ],
      title: "Recommended update for vsftpd",
      tracking: {
         current_release_date: "2022-03-24T11:04:18Z",
         generator: {
            date: "2022-03-24T11:04:18Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "SUSE-RU-2022:0655-1",
         initial_release_date: "2022-03-24T11:04:18Z",
         revision_history: [
            {
               date: "2022-03-24T11:04:18Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "vsftpd-3.0.5-48.3.1.aarch64",
                        product: {
                           name: "vsftpd-3.0.5-48.3.1.aarch64",
                           product_id: "vsftpd-3.0.5-48.3.1.aarch64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "aarch64",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "vsftpd-3.0.5-48.3.1.i586",
                        product: {
                           name: "vsftpd-3.0.5-48.3.1.i586",
                           product_id: "vsftpd-3.0.5-48.3.1.i586",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "i586",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "vsftpd-3.0.5-48.3.1.ppc64le",
                        product: {
                           name: "vsftpd-3.0.5-48.3.1.ppc64le",
                           product_id: "vsftpd-3.0.5-48.3.1.ppc64le",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "ppc64le",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "vsftpd-3.0.5-48.3.1.s390",
                        product: {
                           name: "vsftpd-3.0.5-48.3.1.s390",
                           product_id: "vsftpd-3.0.5-48.3.1.s390",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "s390",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "vsftpd-3.0.5-48.3.1.s390x",
                        product: {
                           name: "vsftpd-3.0.5-48.3.1.s390x",
                           product_id: "vsftpd-3.0.5-48.3.1.s390x",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "s390x",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "vsftpd-3.0.5-48.3.1.x86_64",
                        product: {
                           name: "vsftpd-3.0.5-48.3.1.x86_64",
                           product_id: "vsftpd-3.0.5-48.3.1.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Server 12 SP5",
                        product: {
                           name: "SUSE Linux Enterprise Server 12 SP5",
                           product_id: "SUSE Linux Enterprise Server 12 SP5",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sles:12:sp5",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                        product: {
                           name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                           product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sles_sap:12:sp5",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "vsftpd-3.0.5-48.3.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
               product_id: "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.aarch64",
            },
            product_reference: "vsftpd-3.0.5-48.3.1.aarch64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "vsftpd-3.0.5-48.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
               product_id: "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.ppc64le",
            },
            product_reference: "vsftpd-3.0.5-48.3.1.ppc64le",
            relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "vsftpd-3.0.5-48.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
               product_id: "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.s390x",
            },
            product_reference: "vsftpd-3.0.5-48.3.1.s390x",
            relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "vsftpd-3.0.5-48.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
               product_id: "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.x86_64",
            },
            product_reference: "vsftpd-3.0.5-48.3.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "vsftpd-3.0.5-48.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
               product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.aarch64",
            },
            product_reference: "vsftpd-3.0.5-48.3.1.aarch64",
            relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "vsftpd-3.0.5-48.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
               product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.ppc64le",
            },
            product_reference: "vsftpd-3.0.5-48.3.1.ppc64le",
            relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "vsftpd-3.0.5-48.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
               product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.s390x",
            },
            product_reference: "vsftpd-3.0.5-48.3.1.s390x",
            relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "vsftpd-3.0.5-48.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
               product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.x86_64",
            },
            product_reference: "vsftpd-3.0.5-48.3.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2021-3618",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-3618",
            },
         ],
         notes: [
            {
               category: "general",
               text: "ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.aarch64",
               "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.ppc64le",
               "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.s390x",
               "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.x86_64",
               "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.aarch64",
               "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.ppc64le",
               "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.s390x",
               "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-3618",
               url: "https://www.suse.com/security/cve/CVE-2021-3618",
            },
            {
               category: "external",
               summary: "SUSE Bug 1187678 for CVE-2021-3618",
               url: "https://bugzilla.suse.com/1187678",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.aarch64",
                  "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.ppc64le",
                  "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.s390x",
                  "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.aarch64",
                  "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.ppc64le",
                  "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.s390x",
                  "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.aarch64",
                  "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.ppc64le",
                  "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.s390x",
                  "SUSE Linux Enterprise Server 12 SP5:vsftpd-3.0.5-48.3.1.x86_64",
                  "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.aarch64",
                  "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.ppc64le",
                  "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.s390x",
                  "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vsftpd-3.0.5-48.3.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-03-24T11:04:18Z",
               details: "important",
            },
         ],
         title: "CVE-2021-3618",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.