rsync-announce@lists.samba.org
2005-Jul-07  23:06 UTC
[rsync-announce] rsync 2.6.6pre1 released (ALERT: info on zlib security flaw)
There has been some talk about a zlib security problem that could let
someone overflow the buffers in the zlib decompression code, potentially
allowing someone to craft an exploit to execute arbitrary code.  Since
this is a decompression bug, this can only affect an rsync daemon if
it allows uploads with the --compress option enabled.
If you run a daemon that allows uploads, you may wish to add this line
to your rsyncd.conf file:
    refuse options = compress
(If you already refuse other options, add "compress" after a space to
that line instead of adding a new line.)
I have just finished updating the zlib code in CVS to version 1.2.2 plus
a security patch that fixes this latest exploit.  The other changes in
CVS are all worthwhile fixes, so I have decided to release the current
CVS version as 2.6.6pre1 -- the first pre-release of version 2.6.6.
You can read about all the changes between 2.6.5 and 2.6.6pre1 here:
    http://rsync.samba.org/ftp/rsync/preview/NEWS
You can grab the source tar and its signature here:
    http://rsync.samba.org/ftp/rsync/preview/rsync-2.6.6pre1.tar.gz
    http://rsync.samba.org/ftp/rsync/preview/rsync-2.6.6pre1.tar.gz.asc
If you exercise the compression code of this pre-release version of
rsync, please drop me a line and let me know.  Thanks!
..wayne..
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url :
http://lists.samba.org/archive/rsync-announce/attachments/20050707/060566a2/attachment.bin
Wayne Davison
2005-Jul-08  21:10 UTC
rsync 2.6.6pre1 released (ALERT: info on zlib security flaw)
[I neglected to cross-post this from the rsync-announce list to the
regular rsync mailing list when I sent this out yesterday.]
There has been some talk about a zlib security problem that could let
someone overflow the buffers in the zlib decompression code, potentially
allowing someone to craft an exploit to execute arbitrary code.  Since
this is a decompression bug, this can only affect an rsync daemon if
it allows uploads with the --compress option enabled.
If you run a daemon that allows uploads, you may wish to add this line
to your rsyncd.conf file:
    refuse options = compress
(If you already refuse other options, add "compress" after a space to
that line instead of adding a new line.)
I have just finished updating the zlib code in CVS to version 1.2.2 plus
a security patch that fixes this latest exploit.  The other changes in
CVS are all worthwhile fixes, so I have decided to release the current
CVS version as 2.6.6pre1 -- the first pre-release of version 2.6.6.
You can read about all the changes between 2.6.5 and 2.6.6pre1 here:
    http://rsync.samba.org/ftp/rsync/preview/NEWS
You can grab the source tar and its signature here:
    http://rsync.samba.org/ftp/rsync/preview/rsync-2.6.6pre1.tar.gz
    http://rsync.samba.org/ftp/rsync/preview/rsync-2.6.6pre1.tar.gz.asc
If you exercise the compression code of this pre-release version of
rsync, please drop me a line and let me know.  Thanks!
..wayne..
Possibly Parallel Threads
- rsync 2.6.6pre1 released (ALERT: info on zlib security flaw)
- [LLVMdev] RFC: Using zlib to decompress debug info sections.
- [LLVMdev] RFC: Using zlib to decompress debug info sections.
- [LLVMdev] RFC: Using zlib to decompress debug info sections.
- [LLVMdev] RFC: Using zlib to decompress debug info sections.