[USN-1124-1] rsync vulnerability

看板Bugtraq作者時間14年前 (2011/04/28 03:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
--=-MBo3VuP3Rpsb2VkXyJhL Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Ubuntu Security Notice USN-1124-1 April 27, 2011 rsync vulnerability =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 10.10 - Ubuntu 10.04 LTS - Ubuntu 9.10 Summary: rsync could be made to crash or run programs as your login if it connected to a malicious server. Software Description: - rsync: fast remote file copy program (like rcp) Details: It was discovered that rsync incorrectly handled memory when certain recursion, deletion and ownership options were used. If a user were tricked into connecting to a malicious server, a remote attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 10.10: rsync 3.0.7-2ubuntu1.1 Ubuntu 10.04 LTS: rsync 3.0.7-1ubuntu1.1 Ubuntu 9.10: rsync 3.0.6-1ubuntu1.1 In general, a standard system update will make all the necessary changes. References: CVE-2011-1097 Package Information: https://launchpad.net/ubuntu/+source/rsync/3.0.7-2ubuntu1.1 https://launchpad.net/ubuntu/+source/rsync/3.0.7-1ubuntu1.1 https://launchpad.net/ubuntu/+source/rsync/3.0.6-1ubuntu1.1 --=-MBo3VuP3Rpsb2VkXyJhL Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAABCgAGBQJNuDifAAoJEGVp2FWnRL6TIXoP/Az7pqMRJxccfLubrDpRDi/o Vc1M3VVi/640imDxBMK5xEs5CVIrI7hrAqZ30VILl2wigCIIzIJv/RMl+RcyUX6E p3/GqENnqxD4Q68hIvQVl7Q13tGUxS7GaAF6ffsTIqqxbUZW84Ph6qNeVq+o2jC3 JKmaWEGvoZYzXWrlLXV2yQTzgymfOp51hnIOCh+JPVslrPqYNKuWC7VvtQzFlcoq n0Om749gTTe/5oaL1/Mt9yLYq1Fi7eEYxESmQ91YJ4jj1ut63YIQp9h6SFW2zDwS CNmjVC2Qq9OjYWQSn2l7fm4uB9uJ1nvNFfVTnN6r3LvQUxgg145ItUi53eIjz1Iq JX4j/kvjtuatjaA1E8YX7RHn0wrZB2nDAgU+onWfcRnLRZPq1ck75StVw6UgqmJK +tlPHEyxd3Cajg+myAiJgajvsdmaaDZ+mJCocJDZmx0UZoWOmPF4sjV6pLf56ZFN IXtLtj28fKgxNccNhdCXBJ5ImCrGmBqs4hm1qEWHhorlPm8lruSpSPFAwXBFm2AD RCzafVsRqPoKlfnohZfTgEM0cBOQXCo6oqmf36VBKW/jLqg2fxyU98lVjitkEgwS +/XatEMFU4+w152+Zl3YVkWnLRxwaobj9XCQkLqmGEMCOs16Zx+OaRZj0stmeP4E o7tsdi1PIW7krzqGKWAB =29G6 -----END PGP SIGNATURE----- --=-MBo3VuP3Rpsb2VkXyJhL--
文章代碼(AID): #1Dk6Vlqj (Bugtraq)