ProFTPd: SSH Terrapin vulnerability — GLSA 202509-06

A vulnerability has been discovered in ProFTPd, which can lead to loss of confidentiality.

Affected packages

net-ftp/proftpd on all architectures
Affected versions < 1.3.8b
Unaffected versions >= 1.3.8b

Background

ProFTPD is an advanced and very configurable FTP server.

Description

A vulnerability has been discovered in ProFTPd. Please review the CVE identifier referenced below for details.

Impact

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack.

Workaround

There is no known workaround at this time.

Resolution

All ProFTPd users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.8b"
 

References

Release date
September 17, 2025

Latest revision
September 17, 2025: 1

Severity
normal

Exploitable
remote

Bugzilla entries