Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in rsync
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in rsync
ID: USN-500-1
Distribution: Ubuntu
Plattformen: Ubuntu 6.06, Ubuntu 6.10, Ubuntu 7.04
Datum: Di, 21. August 2007, 00:48
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4091
Applikationen: rsync

Originalnachricht


--===============3504849595680751123==
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature";
boundary="HcccYpVZDxQ8hzPO"
Content-Disposition: inline


--HcccYpVZDxQ8hzPO
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Ubuntu Security Notice USN-500-1 August 20,
2007==========20=================================================
rsync vulnerability
CVE-2007-4091
==========================================================
A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
rsync 2.6.6-1ubuntu2.1

Ubuntu 6.10:
rsync 2.6.8-2ubuntu3.1

Ubuntu 7.04:
rsync 2.6.9-3ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Sebastian Krahmer discovered that rsync contained an off-by-one
miscalculation when handling certain file paths. By creating a specially
crafted tree of files and tricking an rsync server into processing them,
a remote attacker could write a single NULL to stack memory, possibly
leading to arbitrary code execution.


Updated packages for Ubuntu 6.06 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.6-1ubuntu=
2.1.diff.gz
Size/MD5: 55161 6cd634cb545886794ed771279df893e9
http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.6-1ubuntu=
2.1.dsc
Size/MD5: 561 7324148228173c642ca48092b09321ca
http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.6.orig.ta=
r.gz
Size/MD5: 690066 30c4e2849cbeae93f55548453865c2f2

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.6-1ubuntu=
2.1_amd64.deb
Size/MD5: 237356 3c9887ee275f3bd3a84589dc326f73f9

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.6-1ubuntu=
2.1_i386.deb
Size/MD5: 219748 89dfc44e3c8a5f897b3146391189de51

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.6-1ubuntu=
2.1_powerpc.deb
Size/MD5: 238266 3c8ffb7ddb73b7466e461bc9b3567792

sparc architecture (Sun SPARC/UltraSPARC)

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.6-1ubuntu=
2.1_sparc.deb
Size/MD5: 227912 b68f2d7df5958c60db8d928d82c807e4

Updated packages for Ubuntu 6.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.8-2ubuntu=
3.1.diff.gz
Size/MD5: 63808 646a700128fa9b8478d34792887c4276
http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.8-2ubuntu=
3.1.dsc
Size/MD5: 561 87b5f9f829775716738a588fe1449d0d
http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.8.orig.ta=
r.gz
Size/MD5: 772314 082a9dba1f741e6591e5cd748a1233de

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.8-2ubuntu=
3.1_amd64.deb
Size/MD5: 260992 67a07bb1085ea883eef3b232c65e3b50

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.8-2ubuntu=
3.1_i386.deb
Size/MD5: 248638 00b6f25e96fad7b0de2501ec3e8d2f6c

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.8-2ubuntu=
3.1_powerpc.deb
Size/MD5: 264226 9b946b0454917f152a8ecda634082216

sparc architecture (Sun SPARC/UltraSPARC)

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.8-2ubuntu=
3.1_sparc.deb
Size/MD5: 255870 87c614c1185a065852479535a27c978e

Updated packages for Ubuntu 7.04:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.9-3ubuntu=
1.1.diff.gz
Size/MD5: 38919 44b95b6f0725b0833e335d026005f7dd
http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.9-3ubuntu=
1.1.dsc
Size/MD5: 658 efdb8c45d0e7d0ec1190af90608b2e42
http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.9.orig.ta=
r.gz
Size/MD5: 811841 996d8d8831dbca17910094e56dcb5942

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.9-3ubuntu=
1.1_amd64.deb
Size/MD5: 275860 b6bb111fe5c03e7dab73800360ea0787

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.9-3ubuntu=
1.1_i386.deb
Size/MD5: 261948 d4369b89eb66a7c806ccd10ae84e7d15

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.9-3ubuntu=
1.1_powerpc.deb
Size/MD5: 282332 13e0995bce9e9808f881ce9c01be5965

sparc architecture (Sun SPARC/UltraSPARC)

http://security.ubuntu.com/ubuntu/pool/main/r/rsync/rsync_2.6.9-3ubuntu=
1.1_sparc.deb
Size/MD5: 270036 e344c2522560161406eedbd7c111d584


--HcccYpVZDxQ8hzPO
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGyhe4H/9LqRcGPm0RAh/dAJwL4d/mfbJcIW0UpNheeHO1iGit7wCfRFGy
pIlf+tpHR1Csr7woLSjMxrA=
=yw2f
-----END PGP SIGNATURE-----

--HcccYpVZDxQ8hzPO--


--===============3504849595680751123==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============3504849595680751123==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung