UbuntuUpdates.org

Package "rssh"

Name: rssh

Description:

Restricted shell allowing scp, sftp, cvs, svn, rsync or rdist

Latest version: 2.3.4-7ubuntu0.1
Release: bionic (18.04)
Level: updates
Repository: universe
Homepage: http://www.pizzashack.org/rssh/

Links


Download "rssh"


Other versions of "rssh" in Bionic

Repository Area Version
base universe 2.3.4-7
security universe 2.3.4-7ubuntu0.1

Changelog

Version: 2.3.4-7ubuntu0.1 2019-04-11 20:07:21 UTC

  rssh (2.3.4-7ubuntu0.1) bionic-security; urgency=medium

  * SECURITY UPDATE: Command injection
    - debian/patches/0009-Verify-scp-command-options.patch: Validate
      the allowed scp command line and only permit the flags used in
      server mode and only a single argument, to attempt to prevent use
      of ssh options to run arbitrary code on the server. This will
      break scp -3 to a system running rssh, which seems like an
      acceptable loss. (LP #1815935)
    - debian/patches/0007-Verify-rsync-command-options.patch: Tighten
      validation of the rsync command line to require --server be the
      first argument, which should prevent initiation of an outbound rsync
      command from the server, which in turn might allow execution of
      arbitrary code via ssh configuration similar to scp.

      Also reject rsync --daemon and --config command-line options, which
      can be used to run arbitrary commands. Thanks, Nick Cleaton.

      Do not stop checking the rsync command line at --, since this can
      be an argument to some other option and later arguments may still
      be interpreted as options. In the few cases where one needs to
      rsync to files named things like --rsh, the client can use ./--rsh
      instead. Thanks, Nick Cleaton.
    - debian/patches/0010-Check-command-line-after-chroot.patch: Unset
      the HOME environment variable when running rsync to prevent popt
      (against which rsync is linked) from loading a ~/.popt
      configuration file, which can run arbitrary commands on the server
      or redefine command-line options to bypass argument checking.
      Thanks, Nick Cleaton.
    - CVE-2019-1000018
    - CVE-2019-3463
    - CVE-2019-3464

 -- Mike Salvatore <email address hidden> Wed, 10 Apr 2019 13:23:31 -0400

1815935 Regression in 2.3.4-4+deb8u1build0.16.04.1 on scp command parsing
CVE-2019-1000018 rssh version 2.3.4 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in allowscp p
CVE-2019-3463 Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to
CVE-2019-3464 Insufficient sanitization of environment variables passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restri



About   -   Send Feedback to @ubuntu_updates