summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMartin Pool <mbp@sourcefrog.net>2014-11-01 10:06:12 -0700
committerMartin Pool <mbp@sourcefrog.net>2014-11-01 10:06:12 -0700
commitbb247e137dcc940df53405433a1426f7e474160a (patch)
tree858ae9bb3690e5a936f2f02b35a63510074250ef
parentf908af424f7365a0a0c8c70ff8725b2a27604176 (diff)
downloadlibrsync-bb247e137dcc940df53405433a1426f7e474160a.tar.gz
Mention CVE-2014-8242 in the news
-rw-r--r--NEWS15
1 files changed, 7 insertions, 8 deletions
diff --git a/NEWS b/NEWS
index 474f4f6..0fd49cb 100644
--- a/NEWS
+++ b/NEWS
@@ -1,18 +1,17 @@
Changes in 1.0.0 (not yet released)
- * SECURITY: librsync previously used a truncated MD4 "strong" check sum
- to match blocks. However, MD4 is not cryptographically strong. It's
- possible that an attacker who can control the contents of one part of a
- file could use it to control other regions of the file, if it's
- transferred using librsync/rdiff. For example this might occur in a
- database, mailbox, or VM image containing some attacker-controlled
- data.
+ * SECURITY: CVE-2014-8242: librsync previously used a truncated MD4
+ "strong" check sum to match blocks. However, MD4 is not cryptographically
+ strong. It's possible that an attacker who can control the contents of one
+ part of a file could use it to control other regions of the file, if it's
+ transferred using librsync/rdiff. For example this might occur in a
+ database, mailbox, or VM image containing some attacker-controlled data.
To mitigate this issue, signatures will by default be computed with a
256-bit BLAKE2 hash. Old versions of librsync will complain about a
bad magic number when given these signature files.
- Backward compatibility can be obtained using the new
+ Backward compatibility can be obtained using the new
`rdiff sig --hash=md4`
option or through specifying the "signature magic" in the API, but
this should not be used when either the old or new file contain