Mageia alert MGASA-2015-0065 (rsync)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2015-0065: Updated rsync package fixes security vulnerability | |
Date: | Sun, 15 Feb 2015 16:57:41 +0100 | |
Message-ID: | <20150215155741.20760404FF@valstar.mageia.org> |
MGASA-2015-0065 - Updated rsync package fixes security vulnerability Publication date: 15 Feb 2015 URL: http://advisories.mageia.org/MGASA-2015-0065.html Type: security Affected Mageia releases: 4 CVE: CVE-2014-2855 Description: Updated rsync package fixes security vulnerability: Ryan Finnie discovered that rsync 3.1.0 contains a denial of service issue when attempting to authenticate using a nonexistent username. A remote attacker could use this flaw to cause a denial of service via CPU consumption (CVE-2014-2855). The previous update for this issue in MGASA-2014-0179 failed to properly apply the needed patch, so the package has been rebuilt to address this issue. References: - https://bugs.mageia.org/show_bug.cgi?id=13214 - http://openwall.com/lists/oss-security/2014/04/15/1 - http://advisories.mageia.org/MGASA-2014-0179.html - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2855 SRPMS: - 4/core/rsync-3.1.0-4.3.mga4