Trustix: ‘rsync’ Security update

35

Author: JT Smith

Trustix: “This update fixes the signed/unsigned remote exploit bug in rsync. In previous releases the rsync program contained several bugs which would allow remote attackers to write 0-bytes to almost arbitrary stack-locations, thus giving them control over the programflow so that they could obtain a shell remotely.”

From:	 Trustix Secure Linux Advisor <tsl@trustix.com>
To:	 tsl-announce@trustix.org
Subject: TSLSA-2002-0025 - rsync
Date:	 Mon, 28 Jan 2002 15:13:21 +0100
Cc:	 bugtraq@securityfocus.com, linsec@lists.seifried.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2002-0025

Package name:      rsync
Summary:           Security fix
Date:              2002-01-28
Affected versions: TSL 1.01, 1.1, 1.2, 1.5

- --------------------------------------------------------------------------

Problem description:
   This update fixes the signed/unsigned remote exploit bug in rsync. In 
   previous releases the rsync program contained several bugs which would 
   allow remote attackers to write 0-bytes to almost arbitrary stack-
   locations, thus giving them control over the programflow so that they could
   obtain a shell remotely.

Action:
  We recommend that all systems with this package installed are upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it form your system.


Location:
  All TSL updates are available from
  <URI:http://www.trustix.net/pub/Trustix/updates/>
<URI:ftp://ftp.trustix.net/pub/Trustix/updates/>


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.

  Get SWUP from:
  <URI:ftp://ftp.trustix.net/pub/Trustix/software/swup/>


Public testing:
  These packages have been available for public testing for some time.
  If you want to contribute by testing the various packages in the
  testing tree, please feel free to share your findings on the
  tsl-discuss mailinglist.
  The testing tree is located at
  <URI:http://www.trustix.net/pub/Trustix/testing/>
<URI:ftp://ftp.trustix.net/pub/Trustix/testing/>
Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.net/support/>


Verification:
  This advisory along with all TSL packages are signed with the TSL sign key.
  This key is available from:
  <URI:http://www.trustix.net/TSL-GPG-KEY>

The advisory itself is available from the errata pages at
  <URI:http://www.trustix.net/errata/trustix-1.2/> and
  <URI:http://www.trustix.net/errata/trustix-1.5/>
or directly at
  <URI:http://www.trustix.net/errata/misc/2002/TSL-2002-0025-rsync.asc.txt>


MD5sums of the packages:
- --------------------------------------------------------------------------
e4da4af74ebf87feee979beff62af0eb  ./1.5/SRPMS/rsync-2.4.6-4tr.src.rpm
ca5e3bee94f885c83a07628376f7b0e6  ./1.5/RPMS/rsync-2.4.6-4tr.i586.rpm
e4da4af74ebf87feee979beff62af0eb  ./1.2/SRPMS/rsync-2.4.6-4tr.src.rpm
8d5f7deeb4eaf111c9ad8749e737cf3c  ./1.2/RPMS/rsync-2.4.6-4tr.i586.rpm
e4da4af74ebf87feee979beff62af0eb  ./1.1/SRPMS/rsync-2.4.6-4tr.src.rpm
e5713c4a209735d24245b8aea15e2290  ./1.1/RPMS/rsync-2.4.6-4tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE8VUDHwRTcg4BxxS0RAup6AJ9lqDOdTXMdAmV35U2++EYyq4Yj5ACeK1I9
xETxLnWC9YK5c5uoxQIgNDY=
=/Aw5
-----END PGP SIGNATURE-----

_______________________________________________
tsl-announce mailing list
tsl-announce@trustix.org
http://www.trustix.org/mailman/listinfo.cgi/tsl-announce

Category:

  • Linux