[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1JDV29-0007u4-2Q@artemis.annvix.ca>
Date: Fri, 11 Jan 2008 18:19:37 -0700
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2008:011 ] - Updated rsync packages fix restrictions bypass
vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:011
http://www.mandriva.com/security/
_______________________________________________________________________
Package : rsync
Date : January 11, 2008
Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0
_______________________________________________________________________
Problem Description:
rsync before 3.0.0pre6, when running a writable rsync daemon that is
not using chroot, allows remote attackers to access restricted files
via unknown vectors that cause rsync to create a symlink that points
outside of the module's hierarchy. (CVE-2007-6199)
Unspecified vulnerability in rsync before 3.0.0pre6, when running a
writable rsync daemon, allows remote attackers to bypass exclude,
exclude_from, and filter and read or write hidden files via (1)
symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest
options. (CVE-2007-6200)
This update fixes these issues. It is recommended users (specially
system and network administrators) read the manpage about the
introduced munge symlinks feature.
This update also upgrades rsync to version 2.6.9 for all Mandriva
Linux versions earlier than 2008.0.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6199
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6200
http://rsync.samba.org/security.html#s3_0_0
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.0:
fdea773146cff55a58e6c021a411d0d9 2007.0/i586/rsync-2.6.9-0.1mdv2007.0.i586.rpm
93afe1627418872e14aacf9ee2ed4d18 2007.0/SRPMS/rsync-2.6.9-0.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
d9f0b368c1432feba67f51f5d4053d06 2007.0/x86_64/rsync-2.6.9-0.1mdv2007.0.x86_64.rpm
93afe1627418872e14aacf9ee2ed4d18 2007.0/SRPMS/rsync-2.6.9-0.1mdv2007.0.src.rpm
Mandriva Linux 2007.1:
62323582b53e066d60edd4a38c0edcee 2007.1/i586/rsync-2.6.9-1.2mdv2007.1.i586.rpm
b4e0a376cd14cc27d6006f3844e1b576 2007.1/SRPMS/rsync-2.6.9-1.2mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
3f710d1bfb189380264dd57a701b069a 2007.1/x86_64/rsync-2.6.9-1.2mdv2007.1.x86_64.rpm
b4e0a376cd14cc27d6006f3844e1b576 2007.1/SRPMS/rsync-2.6.9-1.2mdv2007.1.src.rpm
Mandriva Linux 2008.0:
55755e81158e1664c48ae5fa69130ca1 2008.0/i586/rsync-2.6.9-5.1mdv2008.0.i586.rpm
e161a0b5150e3d74f8671dbf0aa9e2aa 2008.0/SRPMS/rsync-2.6.9-5.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
df57566d88efb9493b6f417c562d5e3f 2008.0/x86_64/rsync-2.6.9-5.1mdv2008.0.x86_64.rpm
e161a0b5150e3d74f8671dbf0aa9e2aa 2008.0/SRPMS/rsync-2.6.9-5.1mdv2008.0.src.rpm
Corporate 3.0:
7949dd695db813c06f9fc7db853864f8 corporate/3.0/i586/rsync-2.6.9-0.1.C30mdk.i586.rpm
21df68a34ef7732f1a0685d850ceb46d corporate/3.0/SRPMS/rsync-2.6.9-0.1.C30mdk.src.rpm
Corporate 3.0/X86_64:
5a4327131d15f9b008b32471eac47877 corporate/3.0/x86_64/rsync-2.6.9-0.1.C30mdk.x86_64.rpm
21df68a34ef7732f1a0685d850ceb46d corporate/3.0/SRPMS/rsync-2.6.9-0.1.C30mdk.src.rpm
Corporate 4.0:
36f429d7b5f59514b357739cfa022058 corporate/4.0/i586/rsync-2.6.9-0.1.20060mlcs4.i586.rpm
522dab65e48a0d2ce46d7bd29374c5ce corporate/4.0/SRPMS/rsync-2.6.9-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
2c57404df93fae7ac16e27f15bf1cc16 corporate/4.0/x86_64/rsync-2.6.9-0.1.20060mlcs4.x86_64.rpm
522dab65e48a0d2ce46d7bd29374c5ce corporate/4.0/SRPMS/rsync-2.6.9-0.1.20060mlcs4.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)
iD8DBQFHh+oYmqjQ0CJFipgRAhKUAKC9ix4UYefgXxzzJz0LwXaOmKZJOACg5Z3M
/gHpLmHqfbyhA9kjAP1qZzI=
=fCBW
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists