Your message dated Wed, 28 Dec 2005 08:02:06 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#344424: fixed in rssh 2.3.0-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 22 Dec 2005 12:13:41 +0000
>From [EMAIL PROTECTED] Thu Dec 22 04:13:41 2005
Return-path: <[EMAIL PROTECTED]>
Received: from castle.dna.fi ([83.143.58.3] ident=qmailr)
        by spohr.debian.org with smtp (Exim 4.50)
        id 1EpPKH-0000uq-Ae
        for [EMAIL PROTECTED]; Thu, 22 Dec 2005 04:13:41 -0800
Received: (qmail 8303 invoked from network); 22 Dec 2005 14:13:37 +0200
Received: from unknown (HELO chamber.dna.fi) (83.143.58.6)
  by castle.dna.fi with SMTP; 22 Dec 2005 14:13:37 +0200
Received: from wizard by chamber.dna.fi with local (Exim 4.52)
        id 1EpPKD-0000Il-QK
        for [EMAIL PROTECTED]; Thu, 22 Dec 2005 14:13:37 +0200
Date: Thu, 22 Dec 2005 14:13:37 +0200
From: Mikko =?iso-8859-1?Q?H=E4nninen?= <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Root compromise bug if rssh_chroot_helper is installed suid
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
User-Agent: Mutt/1.3.13i
Organization: None
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: rssh
Version: 2.2.3-1
Severity: grave
Tags: security

>From the rssh website, http://www.pizzashack.org/rssh/

  Important Security Notice:

  Max Vozeler has reported a problem whereby rssh can allow users who have
  shell access to systems where rssh is installed (and rssh_chroot_helper
  is installed SUID) to gain root access to the system, due to the
  ability to chroot to arbitrary locations. There are a lot of potentially
  mitigating factors, but to be safe you should upgrade immediately. This
  bug affects all versions of rssh from v2.0.0 to v2.2.3, so please
  upgrade now!

I believe this affects the Debian package, since I could not find any
documentation on this issue being fixed in the current stable verion.
A new version, 2.3.0 is available upstream to fix this issue. I believe
it will also fix bug #339531.


-- 
Mikko Hänninen  <[EMAIL PROTECTED]>
*****  Printed with 100% recycled electrons.  *****

---------------------------------------
Received: (at 344424-close) by bugs.debian.org; 28 Dec 2005 16:11:55 +0000
>From [EMAIL PROTECTED] Wed Dec 28 08:11:55 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 4.50)
        id 1Erdkc-00088u-Vd; Wed, 28 Dec 2005 08:02:06 -0800
From: Jesus Climent <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.65 $
Subject: Bug#344424: fixed in rssh 2.3.0-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Wed, 28 Dec 2005 08:02:06 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

Source: rssh
Source-Version: 2.3.0-1

We believe that the bug you reported is fixed in the latest version of
rssh, which is due to be installed in the Debian FTP archive:

rssh_2.3.0-1.diff.gz
  to pool/main/r/rssh/rssh_2.3.0-1.diff.gz
rssh_2.3.0-1.dsc
  to pool/main/r/rssh/rssh_2.3.0-1.dsc
rssh_2.3.0-1_powerpc.deb
  to pool/main/r/rssh/rssh_2.3.0-1_powerpc.deb
rssh_2.3.0.orig.tar.gz
  to pool/main/r/rssh/rssh_2.3.0.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jesus Climent <[EMAIL PROTECTED]> (supplier of updated rssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 19 Dec 2005 20:00:02 +0200
Source: rssh
Binary: rssh
Architecture: source powerpc
Version: 2.3.0-1
Distribution: unstable
Urgency: high
Maintainer: Jesus Climent <[EMAIL PROTECTED]>
Changed-By: Jesus Climent <[EMAIL PROTECTED]>
Description: 
 rssh       - Restricted shell allowing only scp, sftp, cvs, rsync and/or rdist
Closes: 344395 344424
Changes: 
 rssh (2.3.0-1) unstable; urgency=high
 .
   * New upstream release.
   * This package is a security update:
     - closes CVE-2005-3345.
     - Closes: #344424, #344395
Files: 
 43616b7c0360063d50654b074b0e69ae 592 net optional rssh_2.3.0-1.dsc
 4badd1c95bf9b9507e6642598e809dd5 113701 net optional rssh_2.3.0.orig.tar.gz
 7090f32e81cdf815e9311772dd1ba1c1 13888 net optional rssh_2.3.0-1.diff.gz
 b5d9a545abd38350759d017924e1b2a5 48004 net optional rssh_2.3.0-1_powerpc.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDqzQrZvwdf4aUbWkRAp6wAKDbOBmJcIBKnkkc7N0y6ipQkNOcZACg7AFi
DA5h7ggZi+qz371+OSsRWRs=
=ETnF
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to