Bug 1515735 (CVE-2017-15994)
Summary: | CVE-2017-15994 rsync: Mishandles archaic checksums | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Andrej Nemec <anemec> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | code, hobbes1069, luhliari, mruprich, ssorce |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2017-12-19 16:03:02 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1511412, 1511413, 1511414 | ||
Bug Blocks: | 1515738 |
Description
Andrej Nemec
2017-11-21 09:50:19 UTC
Created rsync tracking bugs for this issue: Affects: fedora-all [bug 1511414] Created rsync-bpc tracking bugs for this issue: Affects: epel-7 [bug 1511413] Affects: fedora-all [bug 1511412] None of the commits listed will apply to rsync-bpc. Most of the code around the changes just isn't there. What version of rsync are they supposed to work with? (In reply to Richard Shaw from comment #2) > None of the commits listed will apply to rsync-bpc. Most of the code around > the changes just isn't there. > > What version of rsync are they supposed to work with? It's entirely possible that rsync-bpc is not vulnerable to these issues, I did not investigate in depth. I think it's only minimally altered to be able to pass some attributes BackupPC needs so I would think it would be, but it's only used from the server side to a client which I think makes this less of a concern. Statement: Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. |