Bug 1527565
Summary: | Backport fix for regression introduced in OpenSSH 7.4 regarding root user and socket forwarding | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Sebastiaan <mail> |
Component: | openssh | Assignee: | Jakub Jelen <jjelen> |
Status: | CLOSED WONTFIX | QA Contact: | BaseOS QE Security Team <qe-baseos-security> |
Severity: | high | Docs Contact: | |
Priority: | medium | ||
Version: | 7.4 | CC: | mgrepl, mthacker, nmavrogi, pasik |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-02-11 15:39:53 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Sebastiaan
2017-12-19 14:14:43 UTC
Thank you for the report. We should certainly fix this with upstream fix or just enable privilege separation for root as we do it in Fedora at this moment (since even root can be confined by SELinux in RHEL/Fedora. For the record, the upstream commit fixing this issue is this one: https://github.com/openssh/openssh-portable/commit/5104586 This issue was not selected to be included either in Red Hat Enterprise Linux 7.7 because it is seen either as low or moderate impact to a small amount of use-cases. The next release will be in Maintenance Support 1 Phase, which means that qualified Critical and Important Security errata advisories (RHSAs) and Urgent Priority Bug Fix errata advisories (RHBAs) may be released as they become available. We will now close this issue, but if you believe that it qualifies for the Maintenance Support 1 Phase, please re-open; otherwise we recommend moving the request to Red Hat Enterprise Linux 8 if applicable. |