Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 344339 - <app-shells/rssh-2.3.3: privilege escalation
Summary: <app-shells/rssh-2.3.3: privilege escalation
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.pizzashack.org/rssh/securi...
Whiteboard: C4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2010-11-06 06:07 UTC by Daniel Black (RETIRED)
Modified: 2011-04-30 22:29 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Daniel Black (RETIRED) gentoo-dev 2010-11-06 06:07:07 UTC
as per url

version bump available
Comment 1 Tim Sammut (RETIRED) gentoo-dev 2010-11-18 21:36:58 UTC
From $URL:

<--

It's been a very long time since the last rssh release, and I like it that way. This release solves two small bugs, with minor security implications:

John Barber reported a problem where, if the system administrator misconfigures rssh by providing two few access bits in the configuration file, the user will be given default permissions (scp) to the entire system, potentially circumventing any configured chroot. Fixing this required a behavior change: In the past, using rssh without a config file would give all users default access to use scp on an unchrooted system. In order to correct the reported bug, this feature has been eliminated, and you must now have a valid configuration file. If no config file exists, all users will be locked out.

Maarten van der Schrieck noticed a bug where, under conditions which are too far-fetched to describe, the rssh_chroot_helper could crash due to calling fgets with a null pointer. This can not occur with a normal, proper installation of rssh. The code path that causes this can only be reached if the system administrator deliberately installs rssh improperly, and the hoops through which one must jump to get it to occur are substantial, so the security impact here is basically nil. But it is a legitimate bug, so I fixed it nonetheless. 

<--

Renaming the existing ebuild appears to download and build 2.3.3 correctly. 
Comment 2 Steve Dibb (RETIRED) gentoo-dev 2011-04-19 22:40:15 UTC
v2.3.3 in CVS
Comment 3 Tim Sammut (RETIRED) gentoo-dev 2011-04-19 22:56:14 UTC
(In reply to comment #2)
> v2.3.3 in CVS

Great, thank you.

Arches, please test and mark stable:
=app-shells/rssh-2.3.3
Target keywords : "amd64 ppc sparc x86"
Comment 4 Thomas Kahle (RETIRED) gentoo-dev 2011-04-20 14:25:54 UTC
x86 stable. Thanks
Comment 5 Brent Baude (RETIRED) gentoo-dev 2011-04-22 16:53:21 UTC
ppc done
Comment 6 Markos Chandras (RETIRED) gentoo-dev 2011-04-25 09:15:51 UTC
amd64 done
Comment 7 Kacper Kowalik (Xarthisius) (RETIRED) gentoo-dev 2011-04-26 07:52:07 UTC
I'd guess you want sparc here, ppc64 was never stable
Comment 8 Raúl Porcel (RETIRED) gentoo-dev 2011-04-30 17:30:02 UTC
sparc stable
Comment 9 Tim Sammut (RETIRED) gentoo-dev 2011-04-30 22:29:46 UTC
Thanks, everyone. Closing noglsa.