Fedora 20 : csync2-1.34-15.fc20 / duplicity-0.6.25-3.fc20 / librsync-1.0.0-1.fc20 / etc (2015-3366)

medium Nessus Plugin ID 81958

Synopsis

The remote Fedora host is missing one or more security updates.

Description

Changes in librsync 1.0.0 (2015-01-23) ======================================

- SECURITY: CVE-2014-8242: librsync previously used a truncated MD4 'strong' check sum to match blocks.
However, MD4 is not cryptographically strong. It's possible that an attacker who can control the contents of one part of a file could use it to control other regions of the file, if it's transferred using librsync/rdiff. For example this might occur in a database, mailbox, or VM image containing some attacker-controlled data. To mitigate this issue, signatures will by default be computed with a 256-bit BLAKE2 hash. Old versions of librsync will complain about a bad magic number when given these signature files. Backward compatibility can be obtained using the new `rdiff sig --hash=md4` option or through specifying the 'signature magic' in the API, but this should not be used when either the old or new file contain untrusted data. Deltas generated from those signatures will also use BLAKE2 during generation, but produce output that can be read by old versions. See https://github.com/librsync/librsync/issues/5. Thanks to Michael Samuel <miknet.net> for reporting this and offering an initial patch.

- Various build fixes, thanks Timothy Gu.

- Improved rdiff man page from Debian.

- Improved librsync.spec file for building RPMs.

- Fixed bug #1110812 'internal error: job made no progress'; on large files.

- Moved hosting to https://github.com/librsync/librsync/

- Travis-CI.org integration test at https://travis-ci.org/librsync/librsync/

- Remove bundled copy of popt; it must be installed separately.

- You can set `$LIBTOOLIZE` before running `autogen.sh`, for example on OS X Homebrew where it is called `glibtoolize`.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected packages.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=1126712

https://github.com/librsync/librsync/

https://github.com/librsync/librsync/issues/5.

http://www.nessus.org/u?8141e605

http://www.nessus.org/u?17aef938

http://www.nessus.org/u?eaaf0e09

http://www.nessus.org/u?d9b0a133

https://travis-ci.org/librsync/librsync/

Plugin Details

Severity: Medium

ID: 81958

File Name: fedora_2015-3366.nasl

Version: 1.6

Type: local

Agent: unix

Published: 3/20/2015

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: cpe:/o:fedoraproject:fedora:20, p-cpe:/a:fedoraproject:fedora:duplicity, p-cpe:/a:fedoraproject:fedora:csync2, p-cpe:/a:fedoraproject:fedora:rdiff-backup, p-cpe:/a:fedoraproject:fedora:librsync

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 3/9/2015

Reference Information

CVE: CVE-2014-8242

FEDORA: 2015-3366