Date: Fri, 30 Apr 2004 11:03:06 +0200
From: Trustix Security Advisor <[email protected]>
To: [email protected]Subject: TSLSA-2004-0024 - rsync
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2004-0024
Package name: rsync
Summary: remote file write attack
Date: 2004-04-29
Affected versions: Trustix Secure Linux 1.5
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Trustix Secure Enterprise Linux 2
- --------------------------------------------------------------------------
Package description:
Rsync uses a quick and reliable algorithm to very quickly bring
remote and host files into sync. Rsync is fast because it just
sends the differences in the files over the network (instead of
sending the complete files). Rsync is often used as a very powerful
mirroring process or just as a more capable replacement for the
rcp command.
Problem description:
From the rsync homepage:
There is a security fix included in 2.6.1 that affects only people
running a read/write daemon WITHOUT using chroot. If the user privs
that such an rsync daemon is using is anything above "nobody", you are
at risk of someone crafting an attack that could write a file outside
of the module's "path". Please either enable chroot or upgrade to 2.6.1.
People not running a daemon, running a read-only daemon, or running a
chrooted daemon are totally unaffected.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0426 to this issue.
Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.
Location:
All Trustix Secure Linux updates are available from
<URI:http://http.trustix.org/pub/trustix/updates/>
<URI:ftp://ftp.trustix.org/pub/trustix/updates/>
About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.
Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.
Public testing:
Most updates for Trustix Secure Linux are made available for public
testing some time before release.
If you want to contribute by testing the various packages in the
testing tree, please feel free to share your findings on the
tsl-discuss mailinglist.
The testing tree is located at
<URI:http://tsldev.trustix.org/horizon/>
You may also use swup for public testing of updates:
site {
class = 0
location = "http://tsldev.trustix.org/horizon/rdfs/latest.rdf"
regexp = ".*"
}
Questions?
Check out our mailing lists:
<URI:http://www.trustix.org/support/>
Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:
<URI:http://www.trustix.org/TSL-SIGN-KEY>
The advisory itself is available from the errata pages at
<URI:http://www.trustix.org/errata/trustix-1.5/>,
<URI:http://www.trustix.org/errata/trustix-2.0/> and
<URI:http://www.trustix.org/errata/trustix-2.1/>
or directly at
<URI:http://www.trustix.org/errata/misc/2004/TSL-2004-0024-rsync.asc.txt>
MD5sums of the packages:
- --------------------------------------------------------------------------
d6cf0a046262e3a206ba201e2e761f03 TSEL-2/rsync-2.6.1-1tr.i586.rpm
d32f76d5cdb248c74dd4578690622cbf TSEL-2/rsync-server-2.6.1-1tr.i586.rpm
b68167646f7d33ea0f621b230aba4be3 1.5/rpms/rsync-2.6.1-0.1tr.i586.rpm
6718369e2c153e87f0cc1e969ed088a0 2.0/rpms/rsync-2.6.1-0.1tr.i586.rpm
a67bdca939fb0452392cb7888f906f5b 2.0/rpms/rsync-server-2.6.1-0.1tr.i586.rpm
de76afb3e05d70fdd48ab3d54ab7a139 2.1/rpms/rsync-2.6.1-1tr.i586.rpm
ca8ec8bcc717b740782473e46d8853e0 2.1/rpms/rsync-server-2.6.1-1tr.i586.rpm
- --------------------------------------------------------------------------
Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQFAkhCVi8CEzsK9IksRAog4AKCbigPi0S8VG1loCHLLMIr2Ue7tSQCfeVzJ
1je2E6EyEUzbiuAOwgzF+gk=
=GDhe
-----END PGP SIGNATURE-----