diff options
author | Martin Pool <mbp@sourcefrog.net> | 2014-11-01 10:06:12 -0700 |
---|---|---|
committer | Martin Pool <mbp@sourcefrog.net> | 2014-11-01 10:06:12 -0700 |
commit | bb247e137dcc940df53405433a1426f7e474160a (patch) | |
tree | 858ae9bb3690e5a936f2f02b35a63510074250ef | |
parent | f908af424f7365a0a0c8c70ff8725b2a27604176 (diff) | |
download | librsync-bb247e137dcc940df53405433a1426f7e474160a.tar.gz |
Mention CVE-2014-8242 in the news
-rw-r--r-- | NEWS | 15 |
1 files changed, 7 insertions, 8 deletions
@@ -1,18 +1,17 @@ Changes in 1.0.0 (not yet released) - * SECURITY: librsync previously used a truncated MD4 "strong" check sum - to match blocks. However, MD4 is not cryptographically strong. It's - possible that an attacker who can control the contents of one part of a - file could use it to control other regions of the file, if it's - transferred using librsync/rdiff. For example this might occur in a - database, mailbox, or VM image containing some attacker-controlled - data. + * SECURITY: CVE-2014-8242: librsync previously used a truncated MD4 + "strong" check sum to match blocks. However, MD4 is not cryptographically + strong. It's possible that an attacker who can control the contents of one + part of a file could use it to control other regions of the file, if it's + transferred using librsync/rdiff. For example this might occur in a + database, mailbox, or VM image containing some attacker-controlled data. To mitigate this issue, signatures will by default be computed with a 256-bit BLAKE2 hash. Old versions of librsync will complain about a bad magic number when given these signature files. - Backward compatibility can be obtained using the new + Backward compatibility can be obtained using the new `rdiff sig --hash=md4` option or through specifying the "signature magic" in the API, but this should not be used when either the old or new file contain |