——————————————————————————–
Fedora Update Notification
FEDORA-2019-e47add6b2b
2019-11-09 21:19:32.241960
——————————————————————————–
Name : rssh
Product : Fedora 31
Version : 2.3.4
Release : 15.fc31
URL : http://www.pizzashack.org/rssh/
Summary : Restricted shell for use with OpenSSH, allowing only scp and/or sftp
Description :
rssh is a restricted shell for use with OpenSSH, allowing only scp
and/or sftp. For example, if you have a server which you only want
to allow users to copy files off of via scp, without providing shell
access, you can use rssh to do that. It is a alternative to scponly.
——————————————————————————–
Update Information:
Fix CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.
——————————————————————————–
ChangeLog:
* Wed Oct 30 2019 Xavier Bachelot <xavier@bachelot.org> – 2.3.4-15
– Clean up specfile.
– Add patches for CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.
——————————————————————————–
References:
[ 1 ] Bug #1672381 – CVE-2019-3463 rssh: rsync bypass resulting in arbitrary code execution [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672381
[ 2 ] Bug #1672383 – CVE-2019-3464 rssh: rsync bypass resulting in arbitrary code execution when built with popt [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672383
[ 3 ] Bug #1672380 – CVE-2019-3463 rssh: rsync bypass resulting in arbitrary code execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672380
[ 4 ] Bug #1671295 – CVE-2019-1000018 rssh: Possible allowscp bypass resulting in arbitrary code execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1671295
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-e47add6b2b’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
——————————————————————————–
Fedora Update Notification
FEDORA-2019-d1487c13ac
2019-11-09 22:37:54.008990
——————————————————————————–
Name : rssh
Product : Fedora 30
Version : 2.3.4
Release : 15.fc30
URL : http://www.pizzashack.org/rssh/
Summary : Restricted shell for use with OpenSSH, allowing only scp and/or sftp
Description :
rssh is a restricted shell for use with OpenSSH, allowing only scp
and/or sftp. For example, if you have a server which you only want
to allow users to copy files off of via scp, without providing shell
access, you can use rssh to do that. It is a alternative to scponly.
——————————————————————————–
Update Information:
Fix CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.
——————————————————————————–
ChangeLog:
* Wed Oct 30 2019 Xavier Bachelot <xavier@bachelot.org> – 2.3.4-15
– Clean up specfile.
– Add patches for CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.
* Fri Jul 26 2019 Fedora Release Engineering <releng@fedoraproject.org> – 2.3.4-14
– Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
——————————————————————————–
References:
[ 1 ] Bug #1672381 – CVE-2019-3463 rssh: rsync bypass resulting in arbitrary code execution [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672381
[ 2 ] Bug #1672383 – CVE-2019-3464 rssh: rsync bypass resulting in arbitrary code execution when built with popt [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672383
[ 3 ] Bug #1672380 – CVE-2019-3463 rssh: rsync bypass resulting in arbitrary code execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672380
[ 4 ] Bug #1671295 – CVE-2019-1000018 rssh: Possible allowscp bypass resulting in arbitrary code execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1671295
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-d1487c13ac’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
——————————————————————————–
Fedora Update Notification
FEDORA-2019-bfb407659e
2019-11-10 01:06:02.434352
——————————————————————————–
Name : rssh
Product : Fedora 29
Version : 2.3.4
Release : 15.fc29
URL : http://www.pizzashack.org/rssh/
Summary : Restricted shell for use with OpenSSH, allowing only scp and/or sftp
Description :
rssh is a restricted shell for use with OpenSSH, allowing only scp
and/or sftp. For example, if you have a server which you only want
to allow users to copy files off of via scp, without providing shell
access, you can use rssh to do that. It is a alternative to scponly.
——————————————————————————–
Update Information:
Fix CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.
——————————————————————————–
ChangeLog:
* Wed Oct 30 2019 Xavier Bachelot <xavier@bachelot.org> – 2.3.4-15
– Clean up specfile.
– Add patches for CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.
* Fri Jul 26 2019 Fedora Release Engineering <releng@fedoraproject.org> – 2.3.4-14
– Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
* Sat Feb 2 2019 Fedora Release Engineering <releng@fedoraproject.org> – 2.3.4-13
– Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
——————————————————————————–
References:
[ 1 ] Bug #1672381 – CVE-2019-3463 rssh: rsync bypass resulting in arbitrary code execution [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672381
[ 2 ] Bug #1672383 – CVE-2019-3464 rssh: rsync bypass resulting in arbitrary code execution when built with popt [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672383
[ 3 ] Bug #1672380 – CVE-2019-3463 rssh: rsync bypass resulting in arbitrary code execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1672380
[ 4 ] Bug #1671295 – CVE-2019-1000018 rssh: Possible allowscp bypass resulting in arbitrary code execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1671295
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-bfb407659e’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org