Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=704e640b4a9dded332ee63f8a8a79dea53a603d0

commit 704e640b4a9dded332ee63f8a8a79dea53a603d0
Author: voroskoi <[EMAIL PROTECTED]>
Date:   Wed Jan 23 21:15:23 2008 +0100

FSA362-rsync

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index dcd4942..7281450 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -27,6 +27,20 @@

<fsas>
<fsa>
+               <id>362</id>
+               <date>2008-01-23</date>
+               <author>voroskoi</author>
+               <package>rsync</package>
+               <vulnerable>2.6.9-2</vulnerable>
+               <unaffected>2.6.9-3sayshell1</unaffected>
+               <bts>http://bugs.frugalware.org/task/2653</bts>
+               <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6199
+                       
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6200</cve>
+               <desc>Two vulnerabilities have been reported in rsync, which 
can be exploited by malicious users to bypass certain security restrictions.
+                       1) An error in the rsync daemon when the "use chroot" 
option is disabled can be exploited to gain access to files outside of the 
module's hierarchy via symlink attacks.
+                       2) An error exists within the enforcing of the 
"exclude", "exclude from", and "filter" options. This can be exploited to 
bypass access restrictions and gain access to hidden files via e.g. symlink 
attacks, if the filename is known.</desc>
+       </fsa>
+       <fsa>
<id>361</id>
<date>2008-01-23</date>
<author>voroskoi</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to