Fedora Linux 8772 Published by

Updated rssh packages has been released for Fedora 29 to address three vulnerability (CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018).



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2019-bfb407659e
2019-11-10 01:06:02.434352
--------------------------------------------------------------------------------

Name : rssh
Product : Fedora 29
Version : 2.3.4
Release : 15.fc29
URL : http://www.pizzashack.org/rssh/
Summary : Restricted shell for use with OpenSSH, allowing only scp and/or sftp
Description :
rssh is a restricted shell for use with OpenSSH, allowing only scp and/or sftp. For example, if you have a server which you only want to allow users to copy files off of via scp, without providing shell access, you can use rssh to do that. It is a alternative to scponly.
--------------------------------------------------------------------------------
Update Information:

Fix CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Oct 30 2019 Xavier Bachelot - 2.3.4-15 - Clean up specfile.
- Add patches for CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018. * Fri Jul 26 2019 Fedora Release Engineering - 2.3.4-14
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild * Sat Feb 2 2019 Fedora Release Engineering - 2.3.4-13
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild --------------------------------------------------------------------------------
References:

[ 1 ] Bug #1672381 - CVE-2019-3463 rssh: rsync bypass resulting in arbitrary code execution [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672381 [ 2 ] Bug #1672383 - CVE-2019-3464 rssh: rsync bypass resulting in arbitrary code execution when built with popt [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672383 [ 3 ] Bug #1672380 - CVE-2019-3463 rssh: rsync bypass resulting in arbitrary code execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672380 [ 4 ] Bug #1671295 - CVE-2019-1000018 rssh: Possible allowscp bypass resulting in arbitrary code execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1671295 --------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2019-bfb407659e' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on theGPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys