Your message dated Wed, 19 Jan 2005 05:17:37 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#284207: fixed in rssh 2.2.3-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 4 Dec 2004 10:21:00 +0000
>From [EMAIL PROTECTED] Sat Dec 04 02:21:00 2004
Return-path: <[EMAIL PROTECTED]>
Received: from albireo.enyo.de [212.9.189.169] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CaX2C-0007nF-00; Sat, 04 Dec 2004 02:21:00 -0800
Received: from deneb.enyo.de ([212.9.189.171])
        by albireo.enyo.de with esmtp id 1CaX2B-0005En-DH
        for [EMAIL PROTECTED]; Sat, 04 Dec 2004 11:20:59 +0100
Received: from fw by deneb.enyo.de with local (Exim 4.43)
        id 1CaX2B-0000wL-6r
        for [EMAIL PROTECTED]; Sat, 04 Dec 2004 11:20:59 +0100
Resent-To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Resent-From: Florian Weimer <[EMAIL PROTECTED]>
Resent-Date: Sat, 04 Dec 2004 11:20:59 +0100
Resent-Message-ID: <[EMAIL PROTECTED]>
X-From-Line: [EMAIL PROTECTED] Sat Dec 04 11:17:30 2004
Received: from fw by deneb.enyo.de with local (Exim 4.43)
        id 1CaWyo-0000vz-A9; Sat, 04 Dec 2004 11:17:30 +0100
From: Florian Weimer <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: rssh: new upstream version fixes arbitrary command execution
X-Mailer: reportbug 3.2
Date: Sat, 04 Dec 2004 11:17:30 +0100
Message-Id: <[EMAIL PROTECTED]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Lines: 15
Resent-Date: Sat, 04 Dec 2004 11:20:59 +0100
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: rssh
Severity: grave
Tags: security upstream
Justification: user security hole

It has been discovered that all rssh versions permit arbitrary command
execution by (authenticated) users:

  <http://www.securityfocus.com/archive/1/383046>

Apparently, a CVE/CAN name still has to be assigned.

rssh is unmaintained upstream.  Please consider removing this package
from sarge because unmaintained software designed to enforce security
policies is typically a nightmare.

---------------------------------------
Received: (at 284207-close) by bugs.debian.org; 19 Jan 2005 10:23:04 +0000
>From [EMAIL PROTECTED] Wed Jan 19 02:23:04 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CrCzP-00011x-00; Wed, 19 Jan 2005 02:23:03 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1CrCu9-0000xs-00; Wed, 19 Jan 2005 05:17:37 -0500
From: Jesus Climent <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#284207: fixed in rssh 2.2.3-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Wed, 19 Jan 2005 05:17:37 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 3

Source: rssh
Source-Version: 2.2.3-1

We believe that the bug you reported is fixed in the latest version of
rssh, which is due to be installed in the Debian FTP archive:

rssh_2.2.3-1.diff.gz
  to pool/main/r/rssh/rssh_2.2.3-1.diff.gz
rssh_2.2.3-1.dsc
  to pool/main/r/rssh/rssh_2.2.3-1.dsc
rssh_2.2.3-1_i386.deb
  to pool/main/r/rssh/rssh_2.2.3-1_i386.deb
rssh_2.2.3.orig.tar.gz
  to pool/main/r/rssh/rssh_2.2.3.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jesus Climent <[EMAIL PROTECTED]> (supplier of updated rssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 19 Jan 2005 10:02:13 +0000
Source: rssh
Binary: rssh
Architecture: source i386
Version: 2.2.3-1
Distribution: unstable
Urgency: high
Maintainer: Jesus Climent <[EMAIL PROTECTED]>
Changed-By: Jesus Climent <[EMAIL PROTECTED]>
Description: 
 rssh       - Restricted shell allowing only scp, sftp, cvs, rsync and/or rdist
Closes: 272899 276697 284207 287300 288828
Changes: 
 rssh (2.2.3-1) unstable; urgency=high
 .
   * New upstream release
   * Security fix: CAN-2004-1161. Closes: #284207.
   * Translations update:
     - de.po: Jens Nachtigall (Closes: #276697)
     - ja.po: Hideki Yamane (Closes: #272899)
     - cs.po: Miroslav Kure (Closes: #287300)
     - it.po: Luca Monducci (Closes: #288828)
   * Urgency set to high due to the security fix and to get it into Sarge.
Files: 
 547fac87e09766c5eacb99c8c819fc41 590 net optional rssh_2.2.3-1.dsc
 74f40a4fd5d2b097af34a817e21a33cf 107216 net optional rssh_2.2.3.orig.tar.gz
 f54950f98465d04f01d125c1b19d5782 36128 net optional rssh_2.2.3-1.diff.gz
 273908ea68d66f348e9d8f4970e59639 39970 net optional rssh_2.2.3-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFB7jCEZvwdf4aUbWkRAkKHAJ0QhMm4bL1YvHZp/ZjtSARUOunV3wCg4jgC
y24zULnYOuyQwsUOUC81JeQ=
=+zve
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to