Two vulnerabilities have been reported in rsync, which can be exploited by malicious users to bypass certain security restrictions. 1) An error in the rsync daemon when the "use chroot" option is disabled can be exploited to gain access to files outside of the module's hierarchy via symlink attacks. 2) An error exists within the enforcing of the "exclude", "exclude from", and "filter" options. This can be exploited to bypass access restrictions and gain access to hidden files via e.g. symlink attacks, if the filename is known. The vulnerabilities are reported in version 2.6.9. Prior versions may also be affected. Solution: apply Vendor Patch: http://rsync.samba.org/ftp/rsync/munge-symlinks-2.6.9.diff Reproducible: Always
maintainers please advise and provide an updated ebuild
rsync-2.6.9-r5 in the tree with the fix from upstream
Arches, please test and mark stable net-misc/rsync-2.6.9-r5. Target keywords : "alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86"
x86 stable
amd64 stable
Stable on arm/sparc
alpha tested and marked stable.
ppc stable
ppc64 stable
Stable for HPPA.
ia64 stable
this bug here is ready for glsa decision
Degrading to B4 since this only affects daemons that allow writing via rsync. I tend to vote NO here because it affects what seems to me a marginal configuration.
voting NO too and closing.
Does not affect current (2008.0) release. Removing release.