SHARE
Facebook X Pinterest WhatsApp

Mandrake Linux Security Advisory: rsync

Written By
thumbnail
Web Webster
Web Webster
Apr 18, 2002
______________________________________________________________________

                Mandrake Linux Security Update Advisory
______________________________________________________________________

Package name:           rsync
Advisory ID:            MDKSA-2002:024-1
Original Advisory Date: March 13th, 2002
Date:                   April 17th, 2002
Affected versions:      7.1, 7.2, 8.0, 8.1, Corporate Server 1.0.1,
                        Single Network Firewall 7.2
______________________________________________________________________

Problem Description:

 Ethan Benson discovered a bug in rsync where the supplementary groups
 that the rsync daemon runs as (such as root) would not be removed
 from the server process after changing to the specified unprivileged
 uid and gid.  This seems only serious if rsync is called using "rsync
 --daemon" from the command line where it will inherit the group of the
 user starting the server (usually root).  Note that, by default,
 Mandrake Linux uses xinetd to handle connections to the rsync daemon.
 This was fixed upstream in version 2.5.3, as well as the previously
 noted zlib fixes (see MDKSA-2002:023).  The authors released 2.5.4 with
 some additional zlib fixes, and all users are encouraged to upgrade to
 this new version of rsync.

Update:

 Mandrake Linux 8.1/ia64 packages are now available.
______________________________________________________________________

References:

 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=132272
______________________________________________________________________

Updated Packages:

 Linux-Mandrake 7.1:
 fdfd74524914606306ab5717b696e030  7.1/RPMS/rsync-2.5.4-1.2mdk.i586.rpm
 34a71b565a7413ecb4efe48acb4df65f  7.1/SRPMS/rsync-2.5.4-1.2mdk.src.rpm

 Linux-Mandrake 7.2:
 7eda7d7a7df5bf088a64990bf5c4d70d  7.2/RPMS/rsync-2.5.4-1.1mdk.i586.rpm
 f425baa9b832265d6a199bd4409a28db  7.2/SRPMS/rsync-2.5.4-1.1mdk.src.rpm

 Mandrake Linux 8.0:
 914f020aa62c9ce6fdd61dfce245fc1c  8.0/RPMS/rsync-2.5.4-1.1mdk.i586.rpm
 f425baa9b832265d6a199bd4409a28db  8.0/SRPMS/rsync-2.5.4-1.1mdk.src.rpm

 Mandrake Linux 8.0/ppc:
 c9c5275126721f7aa38f6a4e09742ce9  ppc/8.0/RPMS/rsync-2.5.4-1.1mdk.ppc.rpm
 f425baa9b832265d6a199bd4409a28db  ppc/8.0/SRPMS/rsync-2.5.4-1.1mdk.src.rpm

 Mandrake Linux 8.1:
 e3733dc91021b997e656fafe86915fe9  8.1/RPMS/rsync-2.5.4-1.1mdk.i586.rpm
 f425baa9b832265d6a199bd4409a28db  8.1/SRPMS/rsync-2.5.4-1.1mdk.src.rpm

 Mandrake Linux 8.1/ia64:
 ce51599f5e62921a090592a293f68010  ia64/8.1/RPMS/rsync-2.5.4-1.1mdk.ia64.rpm
 f425baa9b832265d6a199bd4409a28db  ia64/8.1/SRPMS/rsync-2.5.4-1.1mdk.src.rpm

 Corporate Server 1.0.1:
 fdfd74524914606306ab5717b696e030  1.0.1/RPMS/rsync-2.5.4-1.2mdk.i586.rpm
 34a71b565a7413ecb4efe48acb4df65f  1.0.1/SRPMS/rsync-2.5.4-1.2mdk.src.rpm

 Single Network Firewall 7.2:
 7eda7d7a7df5bf088a64990bf5c4d70d  snf7.2/RPMS/rsync-2.5.4-1.1mdk.i586.rpm
 f425baa9b832265d6a199bd4409a28db  snf7.2/SRPMS/rsync-2.5.4-1.1mdk.src.rpm
______________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):

______________________________________________________________________

To upgrade automatically, use MandrakeUpdate.  The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one 
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".  A list of
FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:

  rpm --checksig <filename>

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team from:

  https://www.mandrakesecure.net/RPM-GPG-KEYS

Please be aware that sometimes it takes the mirrors a few hours to 
update.

You can view other update advisories for Mandrake Linux at:

  http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to.  Information on these lists can be obtained by
visiting:

  http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

  security@linux-mandrake.com
______________________________________________________________________
thumbnail
Web Webster

Web Webster

Web Webster has more than 20 years of writing and editorial experience in the tech sector. He’s written and edited news, demand generation, user-focused, and thought leadership content for business software solutions, consumer tech, and Linux Today, he edits and writes for a portfolio of tech industry news and analysis websites including webopedia.com, and DatabaseJournal.com.

Recommended for you...

Red Hat reveals major enhancements to Red Hat Enterprise Linux AI
sjvn
Oct 22, 2024
How to Find AWS EC2 Instance Type Over SSH (6 Methods)
Benny Lanco
Sep 23, 2024
Crond: Daemon to Execute Scheduled Commands
Rose Hosting Blog
Sep 20, 2024
A Detailed Introduction to Oracle VirtualBox
Senthil Kumar
Sep 19, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.