USN-4292-1: rsync vulnerabilities
25 February 2020
Several security issues were fixed in rsync.
Releases
Packages
- rsync - fast, versatile, remote (and local) file-copying tool
Details
It was discovered that rsync incorrectly handled pointer arithmetic in zlib.
An attacker could use this issue to cause rsync to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2016-9840,
CVE-2016-9841)
It was discovered that rsync incorrectly handled vectors involving left shifts
of negative integers in zlib. An attacker could use this issue to cause rsync
to crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2016-9842)
It was discovered that rsync incorrectly handled vectors involving big-endian
CRC calculation in zlib. An attacker could use this issue to cause rsync to
crash, resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2016-9843)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
Ubuntu 16.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4246-1: zlib, lib32z1-dev, lib64z1-dev, libx32z1-dev, lib64z1, zlib1g-dev, zlib1g, lib32z1, zlib1g-udeb, libx32z1
- USN-6736-1: libklibc, klibc, libklibc-dev, klibc-utils
- USN-6736-2: libklibc, klibc, libklibc-dev, klibc-utils