Fedora Linux 8810 Published by

A rsh security update has been released for Fedora 34.



SECURITY: Fedora 34 Update: rsh-0.17-98.fc34


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-6748ae617b
2022-03-30 01:10:27.034217
--------------------------------------------------------------------------------

Name : rsh
Product : Fedora 34
Version : 0.17
Release : 98.fc34
URL :   ftp://ftp.uk.linux.org/pub/linux/Networking/netkit
Summary : Clients for remote access commands (rsh, rlogin, rcp)
Description :
The rsh package contains a set of programs which allow users to run
commands on remote machines, login to other machines and copy files
between machines (rsh, rlogin and rcp). All three of these commands
use rhosts style authentication. This package contains the clients
needed for all of these services.
The rsh package should be installed to enable remote access to other
machines

--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2019-7282
--------------------------------------------------------------------------------
ChangeLog:

* Mon Mar 21 2022 Michal Ruprich - 0.17-98
- Fix for CVE-2019-7282
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2065721 - CVE-2019-7282 netkit-rsh: rcp access restriction bypass
  https://bugzilla.redhat.com/show_bug.cgi?id=2065721
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-6748ae617b' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________