Changes in librsync 1.0.0 (2015-01-23)

  • SECURITY: CVE-2014-8242: librsync previously used a truncated MD4 "strong" check sum to match blocks. However, MD4 is not cryptographically strong. It's possible that an attacker who can control the contents of one part of a file could use it to control other regions of the file, if it's transferred using librsync/rdiff. For example this might occur in a database, mailbox, or VM image containing some attacker-controlled data. To mitigate this issue, signatures will by default be computed with a 256-bit BLAKE2 hash. Old versions of librsync will complain about a bad magic number when given these signature files. Backward compatibility can be obtained using the new rdiff sig --hash=md4 option or through specifying the "signature magic" in the API, but this should not be used when either the old or new file contain untrusted data. Deltas generated from those signatures will also use BLAKE2 during generation, but produce output that can be read by old versions. See https://github.com/librsync/librsync/issues/5. Thanks to Michael Samuel <miknet.net> for reporting this and offering an initial patch.
  • Various build fixes, thanks Timothy Gu.
  • Improved rdiff man page from Debian.
  • Improved librsync.spec file for building RPMs.
  • Fixed bug #1110812 'internal error: job made no progress'; on large files.
  • Moved hosting to https://github.com/librsync/librsync/
  • Travis-CI.org integration test at https://travis-ci.org/librsync/librsync/
  • Remove bundled copy of popt; it must be installed separately.
  • You can set $LIBTOOLIZE before running autogen.sh, for example on OS X Homebrew where it is called glibtoolize.

This update has been submitted for testing by robert.

6 years ago

This update is currently being pushed to the Fedora EPEL 5 testing updates repository.

6 years ago

This update has been pushed to testing

6 years ago

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

6 years ago

This update has been submitted for stable by robert.

6 years ago

This update is currently being pushed to the Fedora EPEL 5 stable updates repository.

6 years ago

This update has been pushed to stable

6 years ago

Please login to add feedback.

Metadata
Type
security
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
6 years ago
in testing
6 years ago
in stable
6 years ago
BZ#1126712 CVE-2014-8242 librsync: MD4 collision file corruption
0
0
BZ#1126719 librsync: rsync: checksum collisions leading to a denial of service [epel-all]
0
0

Automated Test Results