Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 507698 - <net-misc/rsync-3.1.0-r1: Denial of Service (CVE-2014-2855)
Summary: <net-misc/rsync-3.1.0-r1: Denial of Service (CVE-2014-2855)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-04-15 09:52 UTC by Agostino Sarubbo
Modified: 2015-01-03 22:34 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-04-15 09:52:40 UTC
From ${URL} :

Ryan Finnie discovered that rsync 3.1.0 contains a denial of service issue when
attempting to authenticate using a nonexistent username. A remote attacker could
use this flaw to cause a denial of service via CPU consumption.

Bug reports:
https://bugzilla.samba.org/show_bug.cgi?id=10551
https://bugs.launchpad.net/ubuntu/+source/rsync/+bug/1307230

Fix:
https://git.samba.org/?p=rsync.git;a=commitdiff;h=0dedfbce2c1b851684ba658861fe9d620636c56a



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Lars Wendler (Polynomial-C) (RETIRED) gentoo-dev 2014-04-15 11:48:57 UTC
+*rsync-3.1.0-r1 (15 Apr 2014)
+
+  15 Apr 2014; Lars Wendler <polynomial-c@gentoo.org> -rsync-3.1.0.ebuild,
+  +rsync-3.1.0-r1.ebuild,
+  +files/rsync-3.1.1_pre1-avoid_infinite_wait_reading_secrets_file.patch:
+  Security bump (bug #507698. Removed vulnerable version.
+

No stabilization needed as the affected version still is ~arch everywhere.
Comment 2 Agostino Sarubbo gentoo-dev 2014-04-15 15:21:21 UTC
(In reply to Lars Wendler (Polynomial-C) from comment #1)
> No stabilization needed as the affected version still is ~arch everywhere.

Are you sure that 3.0.9 is not affected?
Comment 3 Lars Wendler (Polynomial-C) (RETIRED) gentoo-dev 2014-04-15 15:36:05 UTC
(In reply to Agostino Sarubbo from comment #2)
> (In reply to Lars Wendler (Polynomial-C) from comment #1)
> > No stabilization needed as the affected version still is ~arch everywhere.
> 
> Are you sure that 3.0.9 is not affected?

No. To be honest I trusted the bug report from launchpad which only mentions rsync-3.1.0.
Comment 4 Agostino Sarubbo gentoo-dev 2014-04-15 17:39:56 UTC
(In reply to Lars Wendler (Polynomial-C) from comment #3)
> No. To be honest I trusted the bug report from launchpad which only mentions
> rsync-3.1.0.

In the doubt...if it is not causing regressions, we can stabilize it to stay safe...
Comment 5 Lars Wendler (Polynomial-C) (RETIRED) gentoo-dev 2014-04-16 13:09:25 UTC
(In reply to Agostino Sarubbo from comment #4)
> (In reply to Lars Wendler (Polynomial-C) from comment #3)
> > No. To be honest I trusted the bug report from launchpad which only mentions
> > rsync-3.1.0.
> 
> In the doubt...if it is not causing regressions, we can stabilize it to stay
> safe...

I did tests with =net-misc/rsync-3.0.9-r3 and unpatched rsync-3.1.0.

rsync-3.0.9-r3 is not affected by this bug, only rsync-3.1.0 and rsync-3.1.1_pre1 (not in portage) are.

So no need to rush into stabilization here.
Comment 6 Yury German Gentoo Infrastructure gentoo-dev 2014-04-17 03:48:03 UTC
Since we have verification version rsync-3.0.9-r3 is not vulnerable and since version 3.1.0 was never stable, and has been removed. With rsync-3.1.0-r1 is a non vulnerable version and can be stabilized separately when ready, I am closing the bug with NOGLSA.
Comment 7 GLSAMaker/CVETool Bot gentoo-dev 2015-01-03 22:34:03 UTC
CVE-2014-2855 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2855):
  The check_secret function in authenticate.c in rsync 3.1.0 and earlier
  allows remote attackers to cause a denial of service (infinite loop and CPU
  consumption) via a user name which does not exist in the secrets file.