--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2019-e47add6b2b
2019-11-09 21:19:32.241960
--------------------------------------------------------------------------------Name        : rssh
Product     : Fedora 31
Version     : 2.3.4
Release     : 15.fc31
URL         : http://www.pizzashack.org/rssh/
Summary     : Restricted shell for use with OpenSSH, allowing only scp and/or sftp
Description :
rssh is a restricted shell for use with OpenSSH, allowing only scp
and/or sftp. For example, if you have a server which you only want
to allow users to copy files off of via scp, without providing shell
access, you can use rssh to do that. It is a alternative to scponly.

--------------------------------------------------------------------------------Update Information:

Fix CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.
--------------------------------------------------------------------------------ChangeLog:

* Wed Oct 30 2019 Xavier Bachelot  - 2.3.4-15
- Clean up specfile.
- Add patches for CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1672381 - CVE-2019-3463 rssh: rsync bypass resulting in arbitrary code execution [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1672381
  [ 2 ] Bug #1672383 - CVE-2019-3464 rssh: rsync bypass resulting in arbitrary code execution when built with popt [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1672383
  [ 3 ] Bug #1672380 - CVE-2019-3463 rssh: rsync bypass resulting in arbitrary code execution [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1672380
  [ 4 ] Bug #1671295 - CVE-2019-1000018 rssh: Possible allowscp bypass resulting in arbitrary code execution [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1671295
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-e47add6b2b' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Fedora 31: rssh FEDORA-2019-e47add6b2b

November 9, 2019
Fix CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.

Summary

rssh is a restricted shell for use with OpenSSH, allowing only scp

and/or sftp. For example, if you have a server which you only want

to allow users to copy files off of via scp, without providing shell

access, you can use rssh to do that. It is a alternative to scponly.

Fix CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.

* Wed Oct 30 2019 Xavier Bachelot - 2.3.4-15

- Clean up specfile.

- Add patches for CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.

[ 1 ] Bug #1672381 - CVE-2019-3463 rssh: rsync bypass resulting in arbitrary code execution [epel-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1672381

[ 2 ] Bug #1672383 - CVE-2019-3464 rssh: rsync bypass resulting in arbitrary code execution when built with popt [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1672383

[ 3 ] Bug #1672380 - CVE-2019-3463 rssh: rsync bypass resulting in arbitrary code execution [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1672380

[ 4 ] Bug #1671295 - CVE-2019-1000018 rssh: Possible allowscp bypass resulting in arbitrary code execution [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1671295

su -c 'dnf upgrade --advisory FEDORA-2019-e47add6b2b' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

FEDORA-2019-e47add6b2b 2019-11-09 21:19:32.241960 Product : Fedora 31 Version : 2.3.4 Release : 15.fc31 URL : http://www.pizzashack.org/rssh/ Summary : Restricted shell for use with OpenSSH, allowing only scp and/or sftp Description : rssh is a restricted shell for use with OpenSSH, allowing only scp and/or sftp. For example, if you have a server which you only want to allow users to copy files off of via scp, without providing shell access, you can use rssh to do that. It is a alternative to scponly. Fix CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018. * Wed Oct 30 2019 Xavier Bachelot - 2.3.4-15 - Clean up specfile. - Add patches for CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018. [ 1 ] Bug #1672381 - CVE-2019-3463 rssh: rsync bypass resulting in arbitrary code execution [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=1672381 [ 2 ] Bug #1672383 - CVE-2019-3464 rssh: rsync bypass resulting in arbitrary code execution when built with popt [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1672383 [ 3 ] Bug #1672380 - CVE-2019-3463 rssh: rsync bypass resulting in arbitrary code execution [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1672380 [ 4 ] Bug #1671295 - CVE-2019-1000018 rssh: Possible allowscp bypass resulting in arbitrary code execution [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1671295 su -c 'dnf upgrade --advisory FEDORA-2019-e47add6b2b' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Change Log

References

Update Instructions

Severity
Product : Fedora 31
Version : 2.3.4
Release : 15.fc31
URL : http://www.pizzashack.org/rssh/
Summary : Restricted shell for use with OpenSSH, allowing only scp and/or sftp

Related News