A flaw in rssh was reported [1] where a remote user could circumvent rssh restrictions through clever manipulation of environment variables on the ssh command line. There is no upstream fix, and the upstream author has no intention of fixing the problem, or in continuing to maintain the software, as noted in the vulnerability report. [1] http://seclists.org/bugtraq/2012/May/35
Created rssh tracking bugs for this issue Affects: fedora-all [bug 820415] Affects: epel-all [bug 820416]
I think that, unless we want to invest in finding an appropriate fix and maintaining this ourselves, we should remove rssh from Fedora and EPEL, due to upstream's disinterest in maintaining it.
*** Bug 820178 has been marked as a duplicate of this bug. ***
Created attachment 590381 [details] rssh-v2.3.4 patch from Derek Martin
(In reply to comment #5) > Created attachment 590381 [details] > rssh-v2.3.4 patch from Derek Martin Source: http://sourceforge.net/mailarchive/forum.php?thread_name=20120605185223.GI17652%40dragontoe.org&forum_name=rssh-discuss
The fix is now included in upstream rssh 2.3.4. http://sourceforge.net/mailarchive/message.php?msg_id=30153369
rssh-2.3.4-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
rssh-2.3.4-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.