Gentoo Logo

rsync: Potential integer overflow


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200605-05 / rsync
Release Date May 06, 2006
Latest Revision May 06, 2006: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-misc/rsync < 2.6.8 >= 2.6.8 All supported architectures

Related bugreports: #131631


An attacker having write access to an rsync module might be able to execute arbitrary code on an rsync server.

2.  Impact Information


rsync is a server and client utility that provides fast incremental file transfers. It is used to efficiently synchronize files between hosts and is used by emerge to fetch Gentoo's Portage tree.


An integer overflow was found in the receive_xattr function from the extended attributes patch (xattr.c) for rsync. The vulnerable function is only present when the "acl" USE flag is set.


A remote attacker with write access to an rsync module could craft malicious extended attributes which would trigger the integer overflow, potentially resulting in the execution of arbitrary code with the rights of the rsync daemon.

3.  Resolution Information


Do not provide write access to an rsync module to untrusted parties.


All rsync users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/rsync-2.6.8"

4.  References


Page updated May 06, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.