Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in rssh
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in rssh
ID: FEDORA-2019-d1487c13ac
Distribution: Fedora
Plattformen: Fedora 30
Datum: Sa, 9. November 2019, 23:53
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1000018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3463
Applikationen: rssh

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2019-d1487c13ac
2019-11-09 22:37:54.008990
-------------------------------------------------------------------------------
-

Name : rssh
Product : Fedora 30
Version : 2.3.4
Release : 15.fc30
URL : http://www.pizzashack.org/rssh/
Summary : Restricted shell for use with OpenSSH, allowing only scp and/or
sftp
Description :
rssh is a restricted shell for use with OpenSSH, allowing only scp
and/or sftp. For example, if you have a server which you only want
to allow users to copy files off of via scp, without providing shell
access, you can use rssh to do that. It is a alternative to scponly.

-------------------------------------------------------------------------------
-
Update Information:

Fix CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Oct 30 2019 Xavier Bachelot <xavier@bachelot.org> - 2.3.4-15
- Clean up specfile.
- Add patches for CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.
* Fri Jul 26 2019 Fedora Release Engineering <releng@fedoraproject.org> -
2.3.4-14
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1672381 - CVE-2019-3463 rssh: rsync bypass resulting in arbitrary
code execution [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672381
[ 2 ] Bug #1672383 - CVE-2019-3464 rssh: rsync bypass resulting in arbitrary
code execution when built with popt [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672383
[ 3 ] Bug #1672380 - CVE-2019-3463 rssh: rsync bypass resulting in arbitrary
code execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672380
[ 4 ] Bug #1671295 - CVE-2019-1000018 rssh: Possible allowscp bypass
resulting in arbitrary code execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1671295
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-d1487c13ac' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung