CVE-2014-8242

NameCVE-2014-8242
Descriptionlibrsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs776246

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
librsync (PTS)jessie, buster, stretch0.9.7-10vulnerable
bullseye2.3.1-1fixed
bookworm2.3.2-1fixed
trixie2.3.4-1fixed
sid2.3.4-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
librsyncsourceexperimental1.0.0-1~exp1
librsyncsource(unstable)2.0.2-1low776246

Notes

[buster] - librsync <ignored> (Minor issue, too instrusive to backport)
[stretch] - librsync <ignored> (Minor issue, too instrusive to backport)
[jessie] - librsync <no-dsa> (Minor issue, too instrusive to backport)
[wheezy] - librsync <no-dsa> (Minor issue, too instrusive to backport)
[squeeze] - librsync <no-dsa> (Minor issue, too instrusive to backport)

Search for package or bug name: Reporting problems