USN-5573-1: rsync vulnerability
18 August 2022
rsync could be made to crash or run programs if it received specially crafted input.
Releases
Packages
- rsync - fast, versatile, remote (and local) file-copying tool
Details
Evgeny Legerov discovered that zlib incorrectly handled memory when
performing certain inflate operations. An attacker could use this issue
to cause rsync to crash, resulting in a denial of service, or possibly
execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04
Ubuntu 18.04
Ubuntu 16.04
-
rsync
-
3.1.1-3ubuntu1.3+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5570-1: zlib1g, zlib-bin, libx32z1, lib64z1, zlib, lib32z1, zlib1g-dev, lib32z1-dev, libx32z1-dev, lib64z1-dev
- USN-5570-2: zlib1g, libx32z1, lib64z1, zlib, lib32z1, zlib1g-dev, lib32z1-dev, libx32z1-dev, lib64z1-dev
- USN-6736-1: libklibc, libklibc-dev, klibc-utils, klibc
- USN-6736-2: libklibc, libklibc-dev, klibc-utils, klibc