Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 23 Dec 2005 00:29:14 +0900 (JST)
From:      Hideyuki KURASHINA <rushani@FreeBSD.org>
To:        FreeBSD-gnats-submit@FreeBSD.org
Subject:   ports/90813: [Maintainer update] shells/scponly: Update to 4.2 (with security fixes)
Message-ID:  <20051223.002914.41650968.rushani@FreeBSD.org>
Resent-Message-ID: <200512221540.jBMFe32R097125@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         90813
>Category:       ports
>Synopsis:       [Maintainer update] shells/scponly: Update to 4.2 (with security fixes)
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          maintainer-update
>Submitter-Id:   current-users
>Arrival-Date:   Thu Dec 22 15:40:03 GMT 2005
>Closed-Date:
>Last-Modified:
>Originator:     Hideyuki KURASHINA
>Release:        FreeBSD 5.4-RELEASE-p8 i386
>Organization:
>Environment:

	System: FreeBSD ***.*******.jp 5.4-RELEASE-p8 FreeBSD 5.4-RELEASE-p8 #1: Thu Dec 1 00:38:07 JST 2005 hideyuki@***.*******.jp:/usr/obj/usr/src/sys/*** i386

>Description:

	o Update to 4.2.
	  - Security fixes (local privilege escalation exploits).  See
            https://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html
            for details.
	  - The scp and WinSCP compatibilities are turned off by default
	    to improve scp argument processing.
          - The sftp-logging supported.
	  - Etc.
	o Add SHA256 hash.
	o Put relevant entry into vuln.xml

>How-To-Repeat:

	Refer
	  
	  http://www.sublimation.org/scponly/
	
>Fix:

	Apply following patch,

Index: Makefile
===================================================================
RCS file: /home/ncvs/ports/shells/scponly/Makefile,v
retrieving revision 1.18
diff -u -r1.18 Makefile
--- Makefile	20 Jun 2005 14:51:14 -0000	1.18
+++ Makefile	22 Dec 2005 14:31:04 -0000
@@ -24,18 +24,10 @@
 # default: undefined
 # define if you want to disable wildcard processing.
 #
-# WITHOUT_SCPONLY_SCP
-# default: undefined
-# define if you want to disable vanilla scp compatibility.
-#
 # WITHOUT_SCPONLY_GFTP
 # default: undefined
 # define if you want to disable gftp compatibility.
 #
-# WITHOUT_SCPONLY_WINSCP
-# default: undefined
-# define if you want to disable WinSCP compatibility.
-#
 # WITH_SCPONLY_CHROOT
 # default: undefined
 # define if you want to use chroot functionality (set UID to root).
@@ -44,6 +36,14 @@
 # default: undefined
 # define if you want to enable rsync compatibility.
 #
+# WITH_SCPONLY_SCP
+# default: undefined
+# define if you want to enable vanilla scp compatibility.
+#
+# WITH_SCPONLY_SFTP_LOGGING
+# default: undefined
+# define if you want to enable sftp logging compatibility.
+#
 # WITH_SCPONLY_SVN
 # default: undefined
 # define if you want to enable subversion compatibility.
@@ -56,6 +56,10 @@
 # default: undefined
 # define if you want to enable unison compatibility.
 #
+# WITH_SCPONLY_WINSCP
+# default: undefined
+# define if you want to enable WinSCP compatibility.
+#
 #
 # Additional knobs:
 #
@@ -66,8 +70,8 @@
 # to be installed.
 
 PORTNAME=	scponly
-PORTVERSION=	4.1
-PORTREVISION=	2
+PORTVERSION=	4.2
+PORTREVISION=	0
 CATEGORIES=	shells
 MASTER_SITES=	http://www.sublimation.org/scponly/
 EXTRACT_SUFX=	.tgz
@@ -90,18 +94,10 @@
 CONFIGURE_ARGS+=--disable-wildcards
 .endif
 
-.if defined(WITHOUT_SCPONLY_SCP)
-CONFIGURE_ARGS+=--disable-scp-compat
-.endif
-
 .if defined(WITHOUT_SCPONLY_GFTP)
 CONFIGURE_ARGS+=--disable-gftp-compat
 .endif
 
-.if defined(WITHOUT_SCPONLY_WINSCP)
-CONFIGURE_ARGS+=--disable-winscp-compat
-.endif
-
 .if defined(WITH_SCPONLY_CHROOT)
 PLIST_SUB=	SCPONLY_CHROOT=""
 CONFIGURE_ARGS+=--enable-chrooted-binary
@@ -113,6 +109,14 @@
 CONFIGURE_ARGS+=--enable-rsync-compat
 .endif
 
+.if defined(WITH_SCPONLY_SCP)
+CONFIGURE_ARGS+=--enable-scp-compat
+.endif
+
+.if defined(WITH_SCPONLY_SFTP_LOGGING)
+CONFIGURE_ARGS+=--enable-sftp-logging-compat
+.endif
+
 .if defined(WITH_SCPONLY_SVN)
 BUILD_DEPENDS+=	svn:${PORTSDIR}/devel/subversion
 RUN_DEPENDS+=	${BUILD_DEPENDS}
@@ -131,6 +135,10 @@
 CONFIGURE_ARGS+=--enable-unison-compat
 .endif
 
+.if defined(WITH_SCPONLY_WINSCP)
+CONFIGURE_ARGS+=--enable-winscp-compat
+.endif
+
 pre-everything::
 	@${ECHO_MSG} ""
 	@${ECHO_MSG} "You can enable chroot functionality by defining WITH_SCPONLY_CHROOT."
Index: distinfo
===================================================================
RCS file: /home/ncvs/ports/shells/scponly/distinfo,v
retrieving revision 1.10
diff -u -r1.10 distinfo
--- distinfo	14 Apr 2005 03:56:00 -0000	1.10
+++ distinfo	22 Dec 2005 09:28:12 -0000
@@ -1,2 +1,3 @@
-MD5 (scponly-4.1.tgz) = 32e4b87dc46c78573010c1146e9744f0
-SIZE (scponly-4.1.tgz) = 93138
+MD5 (scponly-4.2.tgz) = 270dedc527d6fbc68b152b8bb3c8a864
+SHA256 (scponly-4.2.tgz) = 517b5b5966fa78ae3319221a56a6a2e19edf9f4d9910b1a37ca32748104b00f3
+SIZE (scponly-4.2.tgz) = 96736


Index: vuln.xml
===================================================================
RCS file: /home/ncvs/ports/security/vuxml/vuln.xml,v
retrieving revision 1.907
diff -u -u -r1.907 vuln.xml
--- vuln.xml	19 Dec 2005 15:14:33 -0000	1.907
+++ vuln.xml	22 Dec 2005 15:24:32 -0000
@@ -34,6 +34,54 @@
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="b5a49db7-72fc-11da-9827-021106004fd6">
+    <topic>scponly -- local privilege escalation exploits</topic>
+      <affects>
+        <package>
+          <name>scponly</name>
+          <range><lt>4.2</lt></range>
+        </package>
+      </affects>
+      <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+        <p>Max Vozeler reports:</p>
+        <blockquote cite="https://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html">;
+          <p>If ALL the following conditions are true, administrators using
+            scponly-4.1 or older may be at risk of a local privilege
+            escalation exploit:</p>
+          <ul>
+            <li>the chrooted setuid scponlyc binary is installed</li>
+            <li>regular non-scponly users have interactive shell access
+              to the box</li>
+            <li>a user executable dynamically linked setuid binary
+              (such as ping) exists on the same file system mount
+              as the user's home directory</li>
+            <li>the operating system supports an LD_PRELOAD style
+              mechanism to overload dynamic library loading</li>
+          </ul>
+        </blockquote>
+        <p>Pekka Pessi also reports:</p>
+        <blockquote cite="https://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html">;
+          <p>If ANY the following conditions are true, administrators
+            using scponly-4.1 or older may be at risk of a local privilege
+            escalation exploit:</p>
+          <ul>
+            <li>scp compatibility is enabled</li>
+            <li>rsync compatibility is enabled</li>
+          </ul>
+        </blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html</url>;
+      <url>http://sublimation.org/scponly/#relnotes</url>;
+    </references>
+    <dates>
+      <discovery>2005-12-21</discovery>
+      <entry>2005-12-22</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="f7eb0b23-7099-11da-a15c-0060084a00e5">
     <topic>fetchmail -- null pointer dereference in multidrop mode with
       headerless email</topic>
>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20051223.002914.41650968.rushani>