Sicherheit: Hash-Kollision in duplicity
Aktuelle Meldungen Distributionen
Name: Hash-Kollision in duplicity
ID: FEDORA-2015-3366
Distribution: Fedora
Plattformen: Fedora 20
Datum: Fr, 20. März 2015, 00:03
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8242
Applikationen: duplicity


Name        : duplicity
Product : Fedora 20
Version : 0.6.25
Release : 3.fc20
URL : http://www.nongnu.org/duplicity/
Summary : Encrypted bandwidth-efficient backup using rsync algorithm
Description :
Duplicity incrementally backs up files and directory by encrypting
tar-format volumes with GnuPG and uploading them to a remote (or
local) file server. In theory many protocols for connecting to a
file server could be supported; so far ssh/scp, local file access,
rsync, ftp, HSI, WebDAV and Amazon S3 have been written.

Because duplicity uses librsync, the incremental archives are space
efficient and only record the parts of files that have changed since
the last backup. Currently duplicity supports deleted files, full
unix permissions, directories, symbolic links, fifos, device files,
but not hard links.

Update Information:

Changes in librsync 1.0.0 (2015-01-23)

* SECURITY: CVE-2014-8242: librsync previously used a truncated MD4 "strong" check sum to match blocks. However, MD4 is not cryptographically strong. It's possible that an attacker who can control the contents of one part of a file could use it to control other regions of the file, if it's transferred using librsync/rdiff. For example this might occur in a database, mailbox, or VM image containing some attacker-controlled data. To mitigate this issue, signatures will by default be computed with a 256-bit BLAKE2 hash. Old versions of librsync will complain about a bad magic number when given these signature files. Backward compatibility can be obtained using the new `rdiff sig --hash=md4` option or through specifying the "signature magic" in the API, but this should not be used when either the old or new file contain untrusted data. Deltas generated from those signatures will also use BLAKE2 during generation, but produce output that can be read by old versions. See https://github.com/librsync/librsync/issues/5. Thanks to Michael Samuel <miknet.net> for reporting this and offering an initial patch.
* Various build fixes, thanks Timothy Gu.
* Improved rdiff man page from Debian.
* Improved librsync.spec file for building RPMs.
* Fixed bug #1110812 'internal error: job made no progress'; on large
* Moved hosting to https://github.com/librsync/librsync/
* Travis-CI.org integration test at https://travis-ci.org/librsync/librsync/
* Remove bundled copy of popt; it must be installed separately.
* You can set `$LIBTOOLIZE` before running `autogen.sh`, for example on OS X
Homebrew where it is called `glibtoolize`.

* Mon Mar 2 2015 Jon Ciesla <limburgher@gmail.com> - 0.6.25-3
- Patch out deprecation warning to fix deja-dup, BZ 1197627.
* Sun Mar 1 2015 Robert Scheck <robert@fedoraproject.org> 0.6.25-2
- Rebuild for librsync 1.0.0 (#1126712)
* Thu Feb 26 2015 Jon Ciesla <limburgher@gmail.com> - 0.6.25-1
- 0.6.25.
* Sat Aug 16 2014 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 0.6.24-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Sat Jun 7 2014 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 0.6.24-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Mon May 12 2014 Rahul Sundaram <sundaram@fedoraproject.org> - 0.6.24-2
- add build requires on python-setuptools
* Mon May 12 2014 Rahul Sundaram <sundaram@fedoraproject.org> - 0.6.24-1
- update to 0.6.24
- drop patch for documentation and remove it directly in spec
* Fri Apr 11 2014 Rahul Sundaram <sundaram@fedoraproject.org> - 0.6.23-2
- add dependency on python-lockfile
* Fri Apr 11 2014 Rahul Sundaram <sundaram@fedoraproject.org> - 0.6.23-1
- update to 0.6.33
- drop no longer needed patch for Amazon s3 backup
* Fri Jan 17 2014 Rahul Sundaram <sundaram@fedoraproject.org> - 0.6.22-5
- Added patch to fix Amazon s3 backup (#1048068)
* Mon Jan 13 2014 Rahul Sundaram <sundaram@fedoraproject.org> - 0.6.22-4
- Added runtime requirement to python-dropbox (#1048656)
* Fri Dec 27 2013 Rahul Sundaram <sundaram@fedoraproject.org> - 0.6.22-3
- Fix ssl cert enforcement (rhbz#960860)
- Fix bogus date in changelog
* Thu Dec 26 2013 Robert Scheck <robert@fedoraproject.org> 0.6.22-2
- Added runtime requirement to python-paramiko (#819272, #918933)
* Wed Dec 25 2013 Robert Scheck <robert@fedoraproject.org> 0.6.22-1
- Upgrade to 0.6.22 (#903584, #992158)
* Sat Aug 3 2013 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 0.6.21-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild

[ 1 ] Bug #1126712 - CVE-2014-8242 librsync: MD4 collision file corruption

This update can be installed with the "yum" update program. Use
su -c 'yum update duplicity' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Pro-Linux @Facebook
Neue Nachrichten