> Sent: Friday, January 17, 2025 at 2:11 PM
> From: "Andy Smith" <a...@strugglers.net>
> To: debian-user@lists.debian.org
> Subject: Re: A warning about rsync in stable: it became broken 3 days ago, is 
> now fixed
>
> Hi,
> 
> On Fri, Jan 17, 2025 at 03:42:48AM +0100, poc...@homemail.com wrote:
> > > From: "Andy Smith" <a...@strugglers.net>
> > > You can verify this at:
> > >
> > >     https://security-tracker.debian.org/tracker/source-package/rsync
> > 
> > https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-rsync-could-allow-for-remote-code-execution_2025-007
> 
> Okay, I'll try one more time.
> 
> The link you gave above talks about the following security issues:
> 
> CVE-2024-12085
> CVE-2024-12086
> CVE-2024-12087
> CVE-2024-12088
> CVE-2024-12747
> 
> The link that I gave you shows that all of the above already have fixes
> backported to Debian stable-security.
> 
> Since there is no new information here and I am just re-stating what has
> already been shown to you, I wonder if the problem here is that you
> don't understand what backporting is?
> 
> The version of rsync that was first released in Debian 12 is what will
> be in Debian 12 forever. Barring some exceptional circumstances there
> will never be a newer release of rsync in Debian 12. There will never be
> version 3.4.1 of rsync in Debian 12. Any security issues found in the
> version of rsync that is in Debian 12 will have fixes backported to it.
> 
> So it follows that just because the program's --version says 3.2.7, it
> does not mean that it is still vulnerable to all issues found between
> 3.2.7 and 3.4.1 inclusive. You would have to look at the Debian package
> version and check which fixes have been backported.
> 
> Thanks,

Has the following been Fixed or back ported to 3.2.7?

fixed handling of -⁠H flag with conflict in internal flag values

fixed a user after free in logging of failed rename

fixed build on systems without openat()

removed dependency on alloca() in bundled popt

Fixed the included popt to avoid a memory error on modern gcc versions.

Fixed an incorrect extern variable's type that caused an ACL issue on macOS.

Fixed IPv6 configure check

Updated included popt to version 1.19.

Fixed a bug with --sparse --inplace where a trailing gap in the source file 
would not clear out the trailing data in the destination file.

Fixed an buffer overflow in the checksum2 code if SHA1 is being used for the 
checksum2 algorithm.

Fixed an issue when rsync is compiled using _FORTIFY_SOURCE so that the extra 
tests don't complain about a strlcpy() limit value (which was too large, even 
though it wasn't possible for the larger value to cause an overflow).

Add a backtick to the list of characters that the filename quoting needs to 
escape using backslashes.

Fixed a string-comparison issue in the internal handling of --progress (a 
locale such as tr_TR.utf-8 needed the internal triggering of --info options to 
use upper-case flag names to ensure that they match).

Make sure that a local transfer marks the sender side as trusted.

Change the argv handling to work with a newer popt library -⁠-⁠ one that likes 
to free more data than it used to.

Rsync now calls OpenSSL_add_all_algorithms() when compiled against an older 
openssl library.

Fixed a problem in the daemon auth for older protocols (29 and before) if the 
openssl library is being used to compute MD4 checksums.

Fixed an old stats bug that counted devices as symlinks

Enhanced rrsync with the -no-overwrite option that allows you to ensure that 
existing files on your restricted but writable directory can't be modified.

Changed the mapfrom & mapto perl scripts (in the support dir) into a single 
python script named idmap. Converted a couple more perl scripts into python.

Changed the mnt-excl perl script (in the support dir) into a python script.

Reply via email to