Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: vsftpd | Distribution: openSUSE Leap 15.2 |
Version: 3.0.3 | Vendor: openSUSE |
Release: lp152.7.3 | Build date: Thu Feb 6 01:08:19 2020 |
Group: Productivity/Networking/Ftp/Servers | Build host: obs-arm-6 |
Size: 300203 | Source RPM: vsftpd-3.0.3-lp152.7.3.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://security.appspot.com/vsftpd.html | |
Summary: Very Secure FTP Daemon - Written from Scratch |
Vsftpd is an FTP server, or daemon. The "vs" stands for Very Secure. Obviously this is not a guarantee, but the entire codebase was written with security in mind, and carefully designed to be resilient to attack. Recent evidence suggests that vsftpd is also extremely fast (and this is before any explicit performance tuning!). In tests against wu-ftpd, vsftpd was always faster, supporting over twice as many users in some tests.
SUSE-GPL-2.0-with-openssl-exception
* Thu Jun 28 2018 psimons@suse.com - Extend "vsftpd-3.0.3-address_space_limit.patch" to mention the new 'address_space_limit' option in the installed vsftpd.conf(5) man page. [bsc#1075060] * Thu Jun 21 2018 psimons@suse.com - Apply "vsftpd-support-dsa-only-setups.patch" to disable the problematic default setting for rsa_cert_file. Upstream initializes that value to "/usr/share/ssl/certs/vsftpd.pem" and vsftpd won't start up if that file does not exist (or if it does not contain an RSA certificate). Therefore, users who copy a DSA certificate into that location or properly configure a DSA certificate via dsa_cert_file without explicitly disabling the RSA certificate won't be able to start vsftpd. [bsc#975538] * Wed May 16 2018 psimons@suse.com - Don't start/stop parameterized systemd units in pre/post actions. These units cannot be used without an explicit parameter and attempts to do so lead to a confusing "failed to try-restart" error message. [bsc#1093179, bsc#1010177] * Wed Apr 25 2018 psimons@suse.com - vsftpd-enable-syscalls-needed-by-sle15.patch: Enable wait4(), sysinfo(), and shutdown() syscalls in seccomp sandbox. These are required for the daemon to work properly on SLE-15. [bsc#1089088] * Tue Apr 03 2018 vcizek@suse.com - Add firewalld service file (bsc#1083705) * Wed Dec 13 2017 tchvatal@suse.com - Make sure to also require group nobody and user ftp bsc#1070653 * Thu Sep 07 2017 psimons@suse.com - Add "vsftpd-die-with-session.patch" to fix a bug in vsftpd that would cause SSL protocol errors, aborting the connection, whenever system errors occurred that were supposed to be non-fatal. [bsc#1044292] - Add "vsftpd-mdtm-in-utc.patch" to fix interoperability issue with various ftp clients that arose when vsftpd is configured with option "use_localtime=YES". Basically, it's fine to use local time stamps in directory listings, but responding to MDTM commands with any time zone other than UTC directly violates RFC3659 and leads FTP clients to misinterpret the file's time stamp. [bsc#1024961] - Add "vsftpd-append-seek-pipe.patch" to allow the FTP server to append to a file system pipe. [bsc#1048427] - Add "vsftpd-3.0.3-address_space_limit.patch" to create the new configuration option "address_space_limit", which determines the memory limit vsftpd configures for its own process (given in bytes). The previously hard-coded limit (100 MB) may not be sufficient for vsftpd servers running with certain PAM modules enabled, and in such cases administrators may wish to raise the limit to match their system's requirements. [bsc#1042137] - Don't rely on the vsf_findlibs.sh script to figure out the list of libraries the build needs to link. The script is wildly unreliable and it's hard to predict what results it will produce. Also, the results it *does* produce are invisble in the build log. We stumbled across this issue when vsftpd suddendly had build failures on i586 platforms because the script decided to try and link "-lnsl" even though the library was neither installed nor required. - Drop the explicit specification of the LDFLAGS and LINK variables from the call to make. The value of LDFLAGS we passed is the default anyway and giving LINK has no effect since it's not used anywhere in the Makefile. * Wed Jun 14 2017 tchvatal@suse.com - Conditionally install xinetd service only on older releases * On current distributions we support the same functionality via systemd socket activation * Mon Jun 12 2017 daniel.molkentin@suse.com - Fix build against OpenSSL 1.1. Remove lock on 1.0.x libs adds vsftpd-3.0.3-build-with-openssl-1.1.patch (bsc#1042673) * Wed May 31 2017 psimons@suse.com - Explicitly depend on OpenSSL version 1.0.x since vsftpd doesn't compile against the API provided by newer versions. * Tue May 02 2017 kukuk@suse.de - Adjust to new system user/group RPMs * Mon Sep 19 2016 psimons@suse.com - Add vsftpd-3.0.2-fix-chown-uploads.patch to fix a bug in vsftpd where files uploaded by an anonymous user could not be chown()ed to the desired UID as specified in the daemon's configuration file. [bnc#996370] * Wed Aug 31 2016 dimstar@opensuse.org - Extend vsftpd-2.0.4-lib64.diff to also find libcap.so.* in /usr/lib64. * Fri Aug 05 2016 tchvatal@suse.com - Do not bother with omc xml configs, useless nowdays * Wed Mar 23 2016 tchvatal@suse.com - Require shadow and do not output the error out of useradd * Tue Mar 22 2016 tchvatal@suse.com - Fix user creation to not report error when user alredy exist bnc#972169 * Mon Mar 21 2016 tchvatal@suse.com - Fix bnc#970982 hanging on pam_exec in pam.d * Add patch vsftpd-3.0.2-wnohang.patch * Thu Mar 10 2016 jcejka@suse.com - Fix memory leaks in ls.c bnc#968138 * Add patch vsftpd-ls-memleak.patch * Update patch vsftpd-path-normalize.patch - Fix wildcard ? matching bnc#969411 * Update patch vsftpd-2.3.4-sqb.patch * Mon Sep 21 2015 tchvatal@suse.com - Clean-up the init.d support to be bit more readable and add missing dep * Mon Sep 21 2015 joop.boonen@opensuse.org - Brought back additional systemv support so it also builds for SLES 10 and 11 * Tue Sep 08 2015 tchvatal@suse.com - Version bump to 3.0.3: * Increase VSFTP_AS_LIMIT to 200MB; various reports. * Make the PWD response more RFC compliant; report from Barry Kelly <barry@modeltwozero.com>. * Remove the trailing period from EPSV response to work around BT Internet issues; report from Tim Bishop <tdb@mirrorservice.org>. * Fix syslog_enable issues vs. seccomp filtering. Report from Michal Vyskocil <mvyskocil@suse.cz>. At least, syslogging seems to work on my Fedora now. * Allow gettimeofday() in the seccomp sandbox. I can't repro failures, but I probably have a different distro / libc / etc. and there are multiple reports. * Some kernels support PR_SET_NO_NEW_PRIVS but not PR_SET_SECCOMP, so handle this case gracefully. Report from Vasily Averin <vvs@odin.com>. * List the TLS1.2 cipher AES128-GCM-SHA256 as first preference by default. * Make some compile-time SSL defaults (such as correct client shutdown handling) stricter. * Disable Nagle algorithm during SSL data connection shutdown, to avoid 200ms delays. From Tim Kosse <tim.kosse@filezilla-project.org>. * Kill the FTP session if we see HTTP protocol commands, to avoid cross-protocol attacks. A report from Jann Horn <jann@thejh.net>. * Kill the FTP session if we see session re-use failure. A report from Tim Kosse <tim.kosse@filezilla-project.org>. * Enable ECDHE, Tim Kosse <tim.kosse@filezilla-project.org>. * Default cipher list is now just ECDHE-RSA-AES256-GCM-SHA384. * Minor SSL logging improvements. * Un-default tunable_strict_ssl_write_shutdown again. We still have tunable_strict_ssl_read_eof defaulted now, which is the important one to prove upload integrity. - Drop patch vsftpd-allow-dev-log-socket.patch should be included upstream, se above bullet with mvyskocil's email * Tue Jun 23 2015 tchvatal@suse.com - Fix logrotate script to not fail when vsftpd is not running, bnc#935279 * Fri Apr 17 2015 tchvatal@suse.com - Fix hide_file option wrt bnc#927612: * vsftpd-path-normalize.patch * Sun Apr 05 2015 tchvatal@suse.com - bnc#925963 stat is sometimes run on wrong path and results with ENOENT, ensure we sent both dir+file to filter verification: * vsftpd-path-normalize.patch * Wed Mar 25 2015 tchvatal@suse.com - Update patch bit more for sanity checks. Done by rsassu@suse.de: * vsftpd-path-normalize.patch * Mon Mar 23 2015 tchvatal@suse.com - Add back patch attempting to fix bnc#900326 bnc#915522 and bnc#922538: * vsftpd-path-normalize.patch * Mon Mar 23 2015 tchvatal@suse.com - Reset filter patch to match fedora, my work will be restarted in one-off patch to make the changes stand out. Add rest of RH filtering patches: * vsftpd-2.2.0-wildchar.patch * vsftpd-2.3.4-sqb.patch * vsftpd-2.1.0-filter.patch * Mon Mar 23 2015 tchvatal@suse.com - Work on the filter patch and split out the normalisation of the path to separate str function, currently commented out so I avoid huge diffing. * vsftpd-2.1.0-filter.patch * Fri Feb 20 2015 tchvatal@suse.com - Add service calls for other unit files too - Udate filter patch to work as expected: * vsftpd-2.1.0-filter.patch * Fri Jan 02 2015 tchvatal@suse.com - Try to fix deny_file parsing to do more what is expected. Taken from fedora. bnc#900326 bnc#915522 CVE-2015-1419 * vsftpd-2.1.0-filter.patch * Fri Nov 14 2014 dimstar@opensuse.org - No longer perform gpg validation; osc source_validator does it implicit: + Drop gpg-offline BuildRequires. + No longer execute gpg_verify.
/etc/logrotate.d/vsftpd /etc/pam.d/vsftpd /etc/vsftpd.conf /usr/lib/firewalld /usr/lib/firewalld/services /usr/lib/firewalld/services/vsftpd.xml /usr/lib/systemd/system/vsftpd.service /usr/lib/systemd/system/vsftpd.socket /usr/lib/systemd/system/vsftpd@.service /usr/sbin/rcvsftpd /usr/sbin/vsftpd /usr/share/doc/packages/vsftpd /usr/share/doc/packages/vsftpd/AUDIT /usr/share/doc/packages/vsftpd/BUGS /usr/share/doc/packages/vsftpd/Changelog /usr/share/doc/packages/vsftpd/EXAMPLE /usr/share/doc/packages/vsftpd/EXAMPLE/INTERNET_SITE /usr/share/doc/packages/vsftpd/EXAMPLE/INTERNET_SITE/README /usr/share/doc/packages/vsftpd/EXAMPLE/INTERNET_SITE/vsftpd.conf /usr/share/doc/packages/vsftpd/EXAMPLE/INTERNET_SITE/vsftpd.xinetd /usr/share/doc/packages/vsftpd/EXAMPLE/INTERNET_SITE_NOINETD /usr/share/doc/packages/vsftpd/EXAMPLE/INTERNET_SITE_NOINETD/README /usr/share/doc/packages/vsftpd/EXAMPLE/INTERNET_SITE_NOINETD/vsftpd.conf /usr/share/doc/packages/vsftpd/EXAMPLE/PER_IP_CONFIG /usr/share/doc/packages/vsftpd/EXAMPLE/PER_IP_CONFIG/README /usr/share/doc/packages/vsftpd/EXAMPLE/PER_IP_CONFIG/hosts.allow /usr/share/doc/packages/vsftpd/EXAMPLE/README /usr/share/doc/packages/vsftpd/EXAMPLE/VIRTUAL_HOSTS /usr/share/doc/packages/vsftpd/EXAMPLE/VIRTUAL_HOSTS/README /usr/share/doc/packages/vsftpd/EXAMPLE/VIRTUAL_USERS /usr/share/doc/packages/vsftpd/EXAMPLE/VIRTUAL_USERS/README /usr/share/doc/packages/vsftpd/EXAMPLE/VIRTUAL_USERS/logins.txt /usr/share/doc/packages/vsftpd/EXAMPLE/VIRTUAL_USERS/vsftpd.conf /usr/share/doc/packages/vsftpd/EXAMPLE/VIRTUAL_USERS/vsftpd.pam /usr/share/doc/packages/vsftpd/EXAMPLE/VIRTUAL_USERS_2 /usr/share/doc/packages/vsftpd/EXAMPLE/VIRTUAL_USERS_2/README /usr/share/doc/packages/vsftpd/FAQ /usr/share/doc/packages/vsftpd/README /usr/share/doc/packages/vsftpd/README.SUSE /usr/share/doc/packages/vsftpd/README.security /usr/share/doc/packages/vsftpd/REWARD /usr/share/doc/packages/vsftpd/SECURITY /usr/share/doc/packages/vsftpd/SECURITY/DESIGN /usr/share/doc/packages/vsftpd/SECURITY/IMPLEMENTATION /usr/share/doc/packages/vsftpd/SECURITY/OVERVIEW /usr/share/doc/packages/vsftpd/SECURITY/TRUST /usr/share/doc/packages/vsftpd/SIZE /usr/share/doc/packages/vsftpd/SPEED /usr/share/doc/packages/vsftpd/TODO /usr/share/doc/packages/vsftpd/TUNING /usr/share/empty /usr/share/licenses/vsftpd /usr/share/licenses/vsftpd/COPYING /usr/share/licenses/vsftpd/LICENSE /usr/share/man/man5/vsftpd.conf.5.gz /usr/share/man/man8/vsftpd.8.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 12:19:47 2024