Описание
ELSA-2011-0999: rsync security, bug fix, and enhancement update (MODERATE)
[3.0.6-4]
- fix #700450 - free parsed hostnames
- fix #575022 - set TZ variable after chroot
[3.0.6-3]
- Add upstream patch to fix CVE-2011-1097 - Incremental file-list corruption due to temporary file_extra_cnt increments Resolves: #688923
[3.0.6-2]
- Remove BuildRequires dependency on popt-devel, until the package is being shipped with RHEL-5 (resolve build issues)
[3.0.6-1]
- Rebase to upstream version 3.0.6 Resolves: #339971, #471182, #575022, #616093
- Make '-d, --dirs options' behaviour backward-compatible with 2.6.8 Resolves: #339971 (comment #5)
- Truncate a copied sparse file at the end of transaction (-S, --sparse option) Resolves: #530866
- Add -fno-strict-aliasing to CFLAGS
- Remove obsolete rsync-2.6.8-xattr_bug.patch
- Switch license to GPLv3+ (upstream change beginning with 3.0.0)
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
rsync
3.0.6-4.el5
Oracle Linux x86_64
rsync
3.0.6-4.el5
Oracle Linux i386
rsync
3.0.6-4.el5
Связанные CVE
Связанные уязвимости
Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options.
Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options.
Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options.
Unspecified vulnerability in rsync before 3.0.0pre6, when running a wr ...
Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options.