Your message dated Wed, 28 Dec 2005 08:02:06 -0800 with message-id <[EMAIL PROTECTED]> and subject line Bug#344424: fixed in rssh 2.3.0-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 22 Dec 2005 16:47:57 +0000 >From [EMAIL PROTECTED] Thu Dec 22 08:47:57 2005 Return-path: <[EMAIL PROTECTED]> Received: from mx01.hinterhof.net ([83.137.99.114]) by spohr.debian.org with esmtp (Exim 4.50) id 1EpTbg-0001Eh-Pe for [EMAIL PROTECTED]; Thu, 22 Dec 2005 08:47:56 -0800 Received: from localhost (localhost [127.0.0.1]) by mx01.hinterhof.net (Postfix) with ESMTP id 0DC5EFFBF for <[EMAIL PROTECTED]>; Thu, 22 Dec 2005 17:52:15 +0100 (CET) Received: from dp.roam.decl.org (p54A7C266.dip0.t-ipconnect.de [84.167.194.102]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "dp.roam.decl.org", Issuer "ca.decl.org" (verified OK)) by mx01.hinterhof.net (Postfix) with ESMTP id 14859FFB4 for <[EMAIL PROTECTED]>; Thu, 22 Dec 2005 17:52:13 +0100 (CET) Received: by dp.roam.decl.org (Postfix, from userid 1000) id B63B7DF91A; Thu, 22 Dec 2005 17:48:10 +0100 (CET) Date: Thu, 22 Dec 2005 17:48:10 +0100 From: Max Vozeler <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: rssh: local privilege escalation in versions < 2.3.0 (CVE-2005-3345) Message-ID: <[EMAIL PROTECTED]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 Package: rssh Version: 2.2.3-3 Severity: critical Tags: security Hey Jesus, rssh 2.3.0 has been released by Derek to fix the arbitrary chroot() problem and privilege escalation we've mailed about (CVE-2005-3345) http://www.pizzashack.org/rssh/index.shtml: > Dec 18, 2005 > > rssh v2.3.0 released today! > > Important Security Notice: > > Max Vozeler has reported a problem whereby rssh can allow users who > have shell access to systems where rssh is installed (and > rssh_chroot_helper is installed SUID) to gain root access to the > system, due to the ability to chroot to arbitrary locations. There are > a lot of potentially mitigating factors, but to be safe you should > upgrade immediately. This bug affects all versions of rssh from v2.0.0 > to v2.2.3, so please upgrade now! > > The 2.3.0 release of rssh fixes this problem, by forcing the chroot > helper to re-parse the config file to decide where to chroot(2) to. > Users with shell access to the system can not subvert the chroot > location, and may not be able to chroot at all depending on the > configuration of rssh, which solves the problem. Having rssh installed and rssh_chroot_helper setuid root is sufficient for this bug to be exploitable, hence severity critical. cheers, Max --------------------------------------- Received: (at 344424-close) by bugs.debian.org; 28 Dec 2005 16:11:55 +0000 >From [EMAIL PROTECTED] Wed Dec 28 08:11:55 2005 Return-path: <[EMAIL PROTECTED]> Received: from katie by spohr.debian.org with local (Exim 4.50) id 1Erdkc-00088u-Vd; Wed, 28 Dec 2005 08:02:06 -0800 From: Jesus Climent <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.65 $ Subject: Bug#344424: fixed in rssh 2.3.0-1 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Wed, 28 Dec 2005 08:02:06 -0800 X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-CrossAssassin-Score: 2 Source: rssh Source-Version: 2.3.0-1 We believe that the bug you reported is fixed in the latest version of rssh, which is due to be installed in the Debian FTP archive: rssh_2.3.0-1.diff.gz to pool/main/r/rssh/rssh_2.3.0-1.diff.gz rssh_2.3.0-1.dsc to pool/main/r/rssh/rssh_2.3.0-1.dsc rssh_2.3.0-1_powerpc.deb to pool/main/r/rssh/rssh_2.3.0-1_powerpc.deb rssh_2.3.0.orig.tar.gz to pool/main/r/rssh/rssh_2.3.0.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Jesus Climent <[EMAIL PROTECTED]> (supplier of updated rssh package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Mon, 19 Dec 2005 20:00:02 +0200 Source: rssh Binary: rssh Architecture: source powerpc Version: 2.3.0-1 Distribution: unstable Urgency: high Maintainer: Jesus Climent <[EMAIL PROTECTED]> Changed-By: Jesus Climent <[EMAIL PROTECTED]> Description: rssh - Restricted shell allowing only scp, sftp, cvs, rsync and/or rdist Closes: 344395 344424 Changes: rssh (2.3.0-1) unstable; urgency=high . * New upstream release. * This package is a security update: - closes CVE-2005-3345. - Closes: #344424, #344395 Files: 43616b7c0360063d50654b074b0e69ae 592 net optional rssh_2.3.0-1.dsc 4badd1c95bf9b9507e6642598e809dd5 113701 net optional rssh_2.3.0.orig.tar.gz 7090f32e81cdf815e9311772dd1ba1c1 13888 net optional rssh_2.3.0-1.diff.gz b5d9a545abd38350759d017924e1b2a5 48004 net optional rssh_2.3.0-1_powerpc.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDqzQrZvwdf4aUbWkRAp6wAKDbOBmJcIBKnkkc7N0y6ipQkNOcZACg7AFi DA5h7ggZi+qz371+OSsRWRs= =ETnF -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]