proftpd-mysql-1.3.8b-bp155.2.6.1 4>$  ApezI%z + \ڇ9y~ 7t3 4WPYt˴283+lS#GJ vY(cokuzR NMxZW3)@}/"bݑݯmqז[L 皿 #SG}HЪs_]a9AY>>N cGy*! I<)NR:R?@غ(feC iH:~r5@5mP/W #QjÎ71kqe)Q.n~ M%k"!(x+RXl_ I2ʞ_9|];Mѯ9:s#LzG;z=:#ѩ!rQm;K> 5a5Pc ۸hx}@u2=Cn(SWBJi94] Kݦ ]njLNߡ,yH˙sA%8wcXxף5tcM6X^OL& VG8k,(04`wgʕ\(DZIoqG&_q:>Oj3˝Hf `uiN['1'=5+7 0[V8\QQq|_Y蕎pt)A6P5 Gn8!düN+Zc8զ^p)M]J\,,Ec!kHXX*}^:X=l{lǐ4 ̵bG 2ZVHsBSw)/"9]𞮍=WgigF-\1kӝ$œ;<ЋȈ66SӶOCDKd!5(KqzY4R(IfE=Jұ4ٱ{el a{k%99$Wm^U])jiQxL>p>5?5d # <dhtx      Y \`ej   (8%9%:)%F2G2H2I2X2Y2\2]2^2b3c3d4ie4nf4ql4su4v4w5 x5$y5(z5@5P5T5Z5Cproftpd-mysql1.3.8bbp155.2.6.1MySQL Module for ProFTPDThis is the MySQL Module for ProFTPDeoi03-ch1cwchris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.deJohannes Segitz Dominique Leuenberger chris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.deMartin Hauke Bernhard Wiedemann chris@computersalat.dechris@computersalat.deJan Engelhardt Jan Engelhardt chris@computersalat.dechris@computersalat.debwiedemann@suse.comnmoudra@suse.comchris@computersalat.dejengelh@inai.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dejengelh@inai.dechris@computersalat.dechris@computersalat.de- Update changes file * add missing boo#1218144 (CVE-2023-48795) info * add missing CVE-2023-51713 info- 1.3.8b - Released 19-Dec-2023 fix for boo#1218144 (CVE-2023-48795) * http://proftpd.org/docs/NEWS-1.3.8b * Implemented mitigations for "Terrapin" SSH attack (CVE-2023-48795). - rebase patch * proftpd-no_BuildDate.patch- 1.3.8a - Released 08-Oct-2023 fix for boo#1218344 (CVE-2023-51713): gh#1683 - Out-of-bounds buffer read when handling FTP commands. https://github.com/proftpd/proftpd/issues/1683 * http://proftpd.org/docs/NEWS-1.3.8a * Fixed builds when using OpenSSL 3.x- 1.3.7f - Released 04-Dec-2022 * Issue 1533 - mod_tls module unexpectedly allows TLS handshake after authentication in some configurations. * Bug 4491 - unable to verify signed data: signature type 'rsa-sha2-512' does not match publickey algorithm 'ssh-rsa'.- Migration of PAM settings to /usr/lib/pam.d.- Update proftpd-basic.conf.patch * remove obsolete config option, LoginPasswordPrompt - rework proftpd-dist.patch- 1.3.7e - Released 23-Jul-2022 * Issue 1448 - Ensure that mod_sftp algorithms work properly with OpenSSL 3.x. - 1.3.7d - Released 23-Apr-2022 * Issue 1321 - Crash with long lines in AuthGroupFile due to large realloc(3). * Issue 1325 - NLST does not behave consistently for relative paths. * Issue 1346 - Implement AllowForeignAddress class matching for passive data transfers. * Bug 4467 - DeleteAbortedStores removes successfully transferred files unexpectedly. * Issue 1401 - Keepalive socket options should be set using IPPROTO_TCP, not SOL_SOCKET. * Issue 1402 - TCP keepalive SocketOptions should apply to control as well as data connection. * Issue 1396 - ProFTPD always uses the same PassivePorts port for first transfer. * Issue 1369 - Name-based virtual hosts not working as expected after upgrade from 1.3.7a to 1.3.7b. - rebase proftpd-no_BuildDate.patch- fix deps for SLES- remove configure --disable-static- Update to version 1.3.7c: * http://proftpd.org/docs/NEWS-1.3.7c * http://proftpd.org/docs/RELEASE_NOTES-1.3.7c - Update patches * harden_proftpd.service.patch * proftpd-ftpasswd.patch * proftpd-no_BuildDate.patch * proftpd.spec * proftpd_env-script-interpreter.patch- Added hardening to systemd service(s) (bsc#1181400). Added patch(es): * harden_proftpd.service.patch Modified: * proftpd.service- Update to version 1.3.6e: + Invalid SCP command leads to null pointer dereference. - Do not limit to openSSL < 1.1: proftpd has had support for openSSL 1.1 sice version 1.3.6a. - Rebase proftpd-no_BuildDate.patch.- update to 1.3.6d * Issue 857 - Fixed regression in the handling of `%{env:...}` configuration variables when the environment variable is not present. * Issue 940 - Second LIST of the same symlink shows different results. * Issue 959 - FTPS uploads using TLSv1.3 are likely to fail unexpectedly. * Issue 980 - mod_sftp sends broken response when CREATETIME attribute is requested. * Bug 4398 - Handle zero-length SFTP WRITE requests without error. * Issue 1018 - PidFile should not be world-writable. * Issue 1014 - TLSv1.3 handshake fails due to missing session ticket key on some systems. * Issue 1023 - Lowercased FTP commands not properly identified. - rebase proftpd-no_BuildDate.patch- fix for boo#1164572 (CVE-2020-9272, gh#902) - fix for boo#1164574 (CVE-2020-9273, gh#903) - update to 1.3.6c * Fixed regression in directory listing latency (Issue #863). * Detect OpenSSH-specific formatted SFTPHostKeys, and log hint for converting them to supported format. * Fixed use-after-free vulnerability during data transfers (Issue #903). * Fixed out-of-bounds read in mod_cap by updating the bundled libcap (Issue #902). - remove obsolete proftpd-tls-crls-issue859.patch - rebase patches * proftpd-ftpasswd.patch * proftpd-no_BuildDate.patch * proftpd_env-script-interpreter.patch- cleanup tls.template * remove deprecated NoCertRequest from TLSOptions- fix changes file * add missing info about boo#1155834 * add missing info about boo#1154600 - fix for boo#1156210 * GeoIP has been discontinued by Maxmind * remove module build for geoip see https://support.maxmind.com/geolite-legacy-discontinuation-notice/ - fix for boo#1157803 (CVE-2019-19269), boo#1157798 (CVE-2019-19270) * add upstream patch proftpd-tls-crls-issue859.patch- fix for boo#1154600 (CVE-2019-18217, gh#846) - update to 1.3.6b * Fixed pre-authentication remote denial-of-service issue (Issue #846). * Backported fix for building mod_sql_mysql using MySQL 8 (Issue #824). - update to 1.3.6a * Fixed symlink navigation (Bug#4332). * Fixed building of mod_sftp using OpenSSL 1.1.x releases (Issue#674). * Fixed SITE COPY honoring of restrictions (Bug#4372). * Fixed segfault on login when using mod_sftp + mod_sftp_pam (Issue#656). * Fixed restarts when using mod_facl as a static module - remove obsolete proftpd-CVE-2019-12815.patch * included in 1.3.6a (Bug#4372) - add proftpd_env-script-interpreter.patch * RPMLINT fix for env-script-interpreter (Badness: 9)- fix for boo#1155834 * Add missing Requires(pre): group(ftp) for Leap 15 and Tumbleweed * Add missing Requires(pre): user(ftp) for Leap 15 and Tumbleweed- Update proftpd-dist.patch to use pam_keyinit.so (boo#1144056)- fix for boo#1142281 (CVE-2019-12815, bpo#4372) arbitrary file copy in mod_copy allows for remote code execution and information disclosure without authentication - add patch * proftpd-CVE-2019-12815.patch taken from: - http://bugs.proftpd.org/show_bug.cgi?id=4372 - https://github.com/proftpd/proftpd/commit/a73dbfe3b61459e7c2806d5162b12f0957990cb3- update changes file * add missing info about bugzilla 1113041- Fix the Factory build: select the appropriate OpenSSL version to build with. (fix for boo#1113041)- Reduce hard dependency on systemd to only that which is necessary for building and installation. - Modernize RPM macro use (%make_install, %tmpfiles_create). - Strip emphasis from description and trim other platform mentions.- update to 1.3.6 * Support for using Redis for caching, logging; see the doc/howto/Redis.html documentation. * Fixed mod_sql_postgres SSL support (Issue #415). * Support building against LibreSSL instead of OpenSSL (Issue #361). * Better support on AIX for login restraictions (Bug #4285). * TimeoutLogin (and other timeouts) were not working properly for SFTP connections (Bug#4299). * Handling of the SIGILL and SIGINT signals, by the daemon process, now causes the child processes to be terminated as well (Issue #461). * RPM .spec file naming changed to conform to Fedora guidelines. * Fix for "AllowChrootSymlinks off" checking each component for symlinks (CVE-2017-7418). - New Modules: * mod_redis, mod_tls_redis, mod_wrap2_redis With Redis now supported as a caching mechanism, similar to Memcache, there are now Redis-using modules: mod_redis (for configuring the Redis connection information), mod_tls_redis (for caching SSL sessions and OCSP information using Redis), and mod_wrap2_redis (for using ACLs stored in Redis). - Changed Modules: * mod_ban The mod_ban module's BanCache directive can now use Redis-based caching; see doc/contrib/mod_ban.html#BanCache. - New Configuration Directives * SQLPasswordArgon2, SQLPasswordScrypt The key lengths for Argon2 and Scrypt-based passwords are now configurable via these new directives; previously, the key length had been hardcoded to be 32 bytes, which is not interoperable with all other implementations (Issue #454). - Changed Configuration Directives * AllowChrootSymlinks When "AllowChrootSymlinks off" was used, only the last portion of the DefaultRoot path would be checked to see if it was a symlink. Now, each component of the DefaultRoot path will be checked to see if it is a symlink when "AllowChrootSymlinks off" is used. * Include The Include directive can now be used within a section, e.g.: Include /path/to/allowed.txt DenyAll - API Changes * A new JSON API has been added, for use by third-party modules. - remove obsolete proftpd_include-in-limit-section.patch - rebase patches * proftpd-ftpasswd.patch * proftpd-no_BuildDate.patch- update to 1.3.5e * Fixed SFTP issue with umac-64@openssh.com digest/MAC. * Fixed regression with mod_sftp rekeying. * Backported fix for "AllowChrootSymlinks off" checking each component for symlinks (CVE-2017-7418). - remove obsolete patch * proftpd-AllowChrootSymlinks.patch (now included) - rebase patches * proftpd-dist.patch * proftpd-no_BuildDate.patch * proftpd_include-in-limit-section.patch- Sort SHARED_MODS list to fix build compare (boo#1041090)- Removed xinetd service- fix for boo#1032443 (CVE-2017-7418) * AllowChrootSymlinks not enforced by replacing a path component with a symbolic link * add upstream commit (ecff21e0d0e84f35c299ef91d7fda088e516d4ed) as proftpd-AllowChrootSymlinks.patch - fix proftpd-tls.template * reduce TLS protocols to TLSv1.1 and TLSv1.2 * disable TLSCACertificateFile * add TLSCertificateChainFile- Remove --with-pic, there are no static libs. - Replace %__-type macro indirections. - Replace old $RPM shell vars by macros.- fix and update proftpd-basic.conf.patch - add some sample config and templates for tls * proftpd-tls.template * proftpd-limit.conf * proftpd-ssl.README- backport upstream feature * include-in-limit-section (gh#410) * add proftpd_include-in-limit-section.patch- update to 1.3.5d * gh#4283 - All FTP logins treated as anonymous logins again. This is a regression of gh#3307.- update to 1.3.5c * SSH rekey during authentication can cause issues with clients. * Recursive SCP uploads of multiple directories not handled properly. * LIST returns different results for file, depending on path syntax. * "AuthAliasOnly on" in server config breaks anonymous logins. * CapabilitiesEngine directive not honored for / sections. * Support OpenSSL 1.1.x API. * Memory leak when mod_facl is used. -rebase proftpd-no_BuildDate.patch- fix systemd vs SysVinit- Remove redundant spec sections - Ensure systemd-tmpfiles is called for the provied config file- fix for boo#970890 (CVE-2016-3125) - update to 1.3.5b: http://www.proftpd.org/docs/RELEASE_NOTES-1.3.5b * SSH RSA hostkeys smaller than 2048 bits now work properly. * MLSD response lines are now properly CRLF terminated. * Fixed selection of DH groups from TLSDHParamFile. - rebase proftpd-no_BuildDate.patch- fix for boo#927290 (CVE-2015-3306) - update to 1.3.5a: See http://www.proftpd.org/docs/NEWS-1.3.5a - rebase patches * proftpd-ftpasswd.patch * proftpd-no_BuildDate.patch - remove gpg-offline dependency - fix permissions on passwd file * unable to use world-readable AuthUserFile '.../passwd' (perms 0644): * 0644 -> 0440i03-ch1c 17042980951.3.8b-bp155.2.6.11.3.8b-bp155.2.6.1mod_sql_mysql.so/usr/lib/proftpd/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protectionobs://build.opensuse.org/openSUSE:Maintenance:18253/openSUSE_Backports_SLE-15-SP5_Update/61fed305bc2fd75788b811e3d28c8f86-proftpd.openSUSE_Backports_SLE-15-SP5_Updatecpioxz5i586-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=20106c90fdd4a5c9eaa59c596dc6c1d85e64ef73, not strippedRRRRRR|Cf;KY0utf-8f60d0c271f77705ba3b1ecddbcb212fd60552af42181ee77c7abdef544a19403? 7zXZ !t/xK%] crv9wRKe8@]!pNk{6e:b'3S.|kš# sRIbM涩=lAw[|;}vÂB|Nw1?<׾o_[rEF4-xsqH.sv)2߿IVdz|i?YKubOc}U) Sw'CZ;׾KyEadeMq\-z=ONYߜv.ĸx҅uDG5N Je0be.}ޗcK%0=8f__'d3?=ۚzvfi L&" AaI?cʣiX)oR8͡2ʽ kD(L_g|78 y}E+k iʹ,R7? 8lZ|d6CأxFVhͤ~4SU1I/r!4"5pdz3Ww= lYfl/4U L#6fOzl.E!L>UXJ4$"ŠNs%`)/lK܈r TY@HUwZMh> Q%7CƟ+˲؍ gLp髌~x*b|#8I5uPZmjYP%Hodi,ɏ m|'_~|.??ˀ+ 1P?feOoЇ6|wXZ'#lPo< 7{b©\+0MP&r~|?H^y'^nPR׌PӿdCdA+xnRKV V`~bv9k+ftW: fqгfm o][ JɥUBt~4^NlޘS 8  ZĮ4Cu;cT&P76c撑5c͚$~iQ3wE'F+!\"sm'͉O *G([TGzQ;tz,mR YırnC, y@IMRuĪ1FlNXSiV Oa2nWC,9yF0~$*sr/u ˚jCP]/˳1h~hP":ȥZXdLkJah}>s2Xb8`$ZNm%;OM{c^),J;ͮb jcpWטƳվ7 T+B% D|.NRāϱ"Rf[F,<ͯ{ )G4+whREWêq/OMY]]ƕu|4Q$L\Ƕ+dнT1Iu5[_oy!'(?xRcm# zhao8#`\7~#Ń0FfIa^.GHêX.Ȃ'N )TVEJ5J˹u]gvT~ Q(þSI ΰxU.g5LK#aWRW"t@B %Ϋm,myv!8fp-hi7[x-KE}2RjepOƊi\SV[GϺ/lV1 =ȿlף%v+AQp{/74c oOZC qJE %ITN%E󁄞fK ܼ.4&v (:ZùC9YDMF̍H8l̙f0 C|0 $ Y_(\805L;`,i\,=Kf 5;ku= P_7UHS:ѽ9#DgRz`hRL^[Sg!6E3vK9pI>"ICJݘmvOXM޽A1ÌCt!y&OEnvZyZClڑ,-c_HײZw6MNeˆ$ y249H){fBCoՠyWQJFFˌjb-^ѣZɦM:%fVІhcܹ]Z4$g1%})#v鏜uvz! {+`Xi5$|FnC2(iJQL3v'c.vZD3RyK'8Ȏqht뤢v=fHEv x|@:7-c(< Ԟ/M^&A mv]4L52sb#;t- ;ieNښ7J݂{hZ'w?ST^~Zґ) \P^eߪUVQ2e$EF',f`pZXvr0Hiԓ k"׷=pݟF n]M/r` ѩyh s㳀V A'$elҽB2K5UWNt\O_d PL`{5iЩLF/hl*ptpƤcŸqpÎ%ՈYjqBe҅]>y^|A;g& >2sUc$w r D3^e*`~z*Ef >.vrᾡ!i&dOZzO.Q[woFy w #T)ik>񋕭ZHXݦ E3]nMF$9?W@8pXP̗e<Y)x:'"Rߚp;I4.p2zuhՀRyۍ[ȂGhs&bkK 8u]p&++I117[/uftҤc[u^8(Dz~PE;[n`4,x;y.rڸ9~ Σ-\e5p\$UesC4;`3Q6`E<4&.9}h[W{ [(>OQ-Y%(Z)~6#Y'RhUn+.]H#wxR8 <} ֐^Dys=2 RʿL7ö|=5oh?=Y(`CDQE (2ֽI1Lɞel-BdkF8jnou4T2>9 9' ~{#S!M\ =Cޤ^q&yvb,6H㏷Z*WhXK^.ѩ:pM)%<ʇ26dOhw-˯TKԋ/eӐ -D7ښ_]^0.`ٕ`pӚ(D7X W~π=B5{`hӾ%!LZC>Qf1%`a oSÇ({@i9"dҬ ×lOUZZ/e Ϲ$}7GG?1[(wؖ6 7 5{ˀ5q@7Sуm'm %±U/`Vȇ ?\u>s!@?8U^?;`R֯bnɳ\qi:(j4-/Q-|Y ZaF7hC 1ɘrRc[v` ʩ?:7l)hخ6pWmyFT]d*ܐ)>Ԫ|K{׍Vy@%nq-Ú2_/"?z@PgH he KQީoaMT[*S? )+ǮE nr!B_ WB9&оhAMW\ U# ܽ1%R= Q2VqZ۫8\?Qˈ}$ D$=D"6T- M($mhF9٧pQzᲊtStɓaJY$}POqmV;=SU(Ldx$\kss!=+ߞ)e%Bڑ"'++©h,Y繈&ta GYw?NPᥘ􇤝(XD:lt,r, K=S[3{RzLgYCY1 B_p2_y.^7!]xQ& $/9 N`8 UgYyrd+E|9!c^SwNUIop+]Ǔ@쏘j R[Lit^]ϲi[l!" -SVlAvr+. 0rR"鋆賔#zdw+: " R) /;xpUq' M&#LWʼna6j[%RJXڗHۗxEaO mfy-A0z,w~4Ad e}|DGth3),a}Zͷ"^_`wB=nh&pFL.~$_Gd> 38/(Nq@aW{3".>hYbɔ֔2ijh਀E&zhb:; $JPzr;ͫ88x{J iAqQo()6j#ZK!'AHx`%Objb#O|7;AVf.;RJHU>=[*Y U>يċϣ=,JWpΫ:GoCs-\Xg {e.%:e ݼ!z\l%rutsll]V3 sNƆBH*Q;f {$țxq8bU"$Dẃ40[$5^MmV(ל3GnM/e2MʀPD} QiB(F+,#2t}3?v2>čxԿ-@}K&0G'Bд\_mUP &)C?' RTCd $A|c\kn۲@Rkt)W?Ǝ8BuaWn7xx~7;_*wU'][ ɒƑ1xn7:=e3GcLoԣiѐOaZvڈ'ʋYK#II=/gg*y]eD/<6zP~*3WDpU+ E]d0[" \\ }d<>>8g<߬nwHoRv+<_ՂM4wR|%x0g<”lך_U;=lz9h@ N/;*H$th'XoRb`aB&, ^u-CJ%ͦ z%E'q?%ݏ70Z)'= 4rs\S?#1J$ J.#5\L[KwACZj[ ^B[>6۾%A0} DĈN͸&М|;Hup 9+K|p1F,0 U[t =M靽(b)WIy젩R̫ =#/ vԫ-~挾j׽z ;icLd<nDY?xeE^FjTXiXH%;|:9ŋss)+XVQ2gEfGXKwӛ+$C%KCjV+Rz lna`M&BtVi3B&f.-="K.i4!io0?ӰS((Ͼs,,ukjK+[ BqLIstgnILGoZM]n1_LY{giÀf,Bh@[< C,c@(aQ&02[teQCH-W?.>ALzԴ\5%C tx&k켧/pITY+2*Ε||8|8|uxﺰMAhEgX@ibܗֳ׊p9gDž }`j*cN-$Clx:$zGQ.娙u'hTG?^jyE+nn]s$kxj?UP,X:9AlՐ\xE< }9&ɍZȇ [vUEƒ|XDԶW$pFEP7WL Tf]/+fμ'ۯx5\?tM"lPj4$ҡ u~% tEuK/q(J _´C|[@Ӟpa5p  'AOM VI0Y8@3뷼cÍcTVwk8!V> WX0s}!(FNbC{h-##ذv O,ׅRJm2ĬXq]wb M)IvUT!%u :,w/rM-eF&;z:b?Ϙl<VX^@I@^ٱ.Cm[W<@ei, xͪd"nc O`F\T33@  2 Kථ`ypk+Q j𝃁_"r>|Lst'\XRu5DoޜGibw>z. ɿn7f ^ %m ] ,]Dz?#. .=gPkw~:'Z0w܌AՇo7MG o#Gvn8w>@)@){F4h(G WKLX3YMz6RiFOcin;=72@1Y->w(ks2{_BMUl, @ұ7HI|-UQYs}M"Ccb5ZcV@d;qE)S])V(hau"KT YZ