Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2007-6199

Published: 1 December 2007

rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.

Notes

AuthorNote
jdstrand
lowering priority as it is only for rsyncd while not running in
chroot.  This is a not-recommended, non-standard configuration. Above patch
adds a configuration option to make this configuration 'safer'.

Priority

Low

Status

Package Release Status
rsync
Launchpad, Ubuntu, Debian
dapper Ignored
(end of life)
edgy Ignored
(end of life, was needed)
feisty Ignored
(end of life, was needed)
gutsy Ignored
(end of life, was needed)
hardy Not vulnerable
(2.6.9-6ubuntu1)
intrepid Not vulnerable
(2.6.9-6ubuntu1)
jaunty Not vulnerable
(2.6.9-6ubuntu1)
karmic Not vulnerable
(2.6.9-6ubuntu1)
lucid Not vulnerable
(2.6.9-6ubuntu1)
maverick Not vulnerable
(2.6.9-6ubuntu1)
natty Not vulnerable
(2.6.9-6ubuntu1)
upstream
Released (2.6.9-5.1)
Patches:
upstream: http://rsync.samba.org/ftp/rsync/munge-symlinks-2.6.9.diff