A vulnerability has been discovered in ProFTPd, which can lead to loss of confidentiality.
Package | net-ftp/proftpd on all architectures |
---|---|
Affected versions | < 1.3.8b |
Unaffected versions | >= 1.3.8b |
ProFTPD is an advanced and very configurable FTP server.
A vulnerability has been discovered in ProFTPd. Please review the CVE identifier referenced below for details.
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack.
There is no known workaround at this time.
All ProFTPd users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.8b"
Release date
September 17, 2025
Latest revision
September 17, 2025: 1
Severity
normal
Exploitable
remote
Bugzilla entries