lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 11 Jan 2008 18:19:37 -0700
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2008:011 ] - Updated rsync packages fix
 restrictions bypass vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDVSA-2008:011
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : rsync
 Date    : January 11, 2008
 Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 rsync before 3.0.0pre6, when running a writable rsync daemon that is
 not using chroot, allows remote attackers to access restricted files
 via unknown vectors that cause rsync to create a symlink that points
 outside of the module's hierarchy. (CVE-2007-6199)
 
 Unspecified vulnerability in rsync before 3.0.0pre6, when running a
 writable rsync daemon, allows remote attackers to bypass exclude,
 exclude_from, and filter and read or write hidden files via (1)
 symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest
 options. (CVE-2007-6200)
 
 This update fixes these issues. It is recommended users (specially
 system and network administrators) read the manpage about the
 introduced munge symlinks feature.
 
 This update also upgrades rsync to version 2.6.9 for all Mandriva
 Linux versions earlier than 2008.0.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6199
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6200
 http://rsync.samba.org/security.html#s3_0_0
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 fdea773146cff55a58e6c021a411d0d9  2007.0/i586/rsync-2.6.9-0.1mdv2007.0.i586.rpm 
 93afe1627418872e14aacf9ee2ed4d18  2007.0/SRPMS/rsync-2.6.9-0.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 d9f0b368c1432feba67f51f5d4053d06  2007.0/x86_64/rsync-2.6.9-0.1mdv2007.0.x86_64.rpm 
 93afe1627418872e14aacf9ee2ed4d18  2007.0/SRPMS/rsync-2.6.9-0.1mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 62323582b53e066d60edd4a38c0edcee  2007.1/i586/rsync-2.6.9-1.2mdv2007.1.i586.rpm 
 b4e0a376cd14cc27d6006f3844e1b576  2007.1/SRPMS/rsync-2.6.9-1.2mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 3f710d1bfb189380264dd57a701b069a  2007.1/x86_64/rsync-2.6.9-1.2mdv2007.1.x86_64.rpm 
 b4e0a376cd14cc27d6006f3844e1b576  2007.1/SRPMS/rsync-2.6.9-1.2mdv2007.1.src.rpm

 Mandriva Linux 2008.0:
 55755e81158e1664c48ae5fa69130ca1  2008.0/i586/rsync-2.6.9-5.1mdv2008.0.i586.rpm 
 e161a0b5150e3d74f8671dbf0aa9e2aa  2008.0/SRPMS/rsync-2.6.9-5.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 df57566d88efb9493b6f417c562d5e3f  2008.0/x86_64/rsync-2.6.9-5.1mdv2008.0.x86_64.rpm 
 e161a0b5150e3d74f8671dbf0aa9e2aa  2008.0/SRPMS/rsync-2.6.9-5.1mdv2008.0.src.rpm

 Corporate 3.0:
 7949dd695db813c06f9fc7db853864f8  corporate/3.0/i586/rsync-2.6.9-0.1.C30mdk.i586.rpm 
 21df68a34ef7732f1a0685d850ceb46d  corporate/3.0/SRPMS/rsync-2.6.9-0.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 5a4327131d15f9b008b32471eac47877  corporate/3.0/x86_64/rsync-2.6.9-0.1.C30mdk.x86_64.rpm 
 21df68a34ef7732f1a0685d850ceb46d  corporate/3.0/SRPMS/rsync-2.6.9-0.1.C30mdk.src.rpm

 Corporate 4.0:
 36f429d7b5f59514b357739cfa022058  corporate/4.0/i586/rsync-2.6.9-0.1.20060mlcs4.i586.rpm 
 522dab65e48a0d2ce46d7bd29374c5ce  corporate/4.0/SRPMS/rsync-2.6.9-0.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 2c57404df93fae7ac16e27f15bf1cc16  corporate/4.0/x86_64/rsync-2.6.9-0.1.20060mlcs4.x86_64.rpm 
 522dab65e48a0d2ce46d7bd29374c5ce  corporate/4.0/SRPMS/rsync-2.6.9-0.1.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHh+oYmqjQ0CJFipgRAhKUAKC9ix4UYefgXxzzJz0LwXaOmKZJOACg5Z3M
/gHpLmHqfbyhA9kjAP1qZzI=
=fCBW
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ