Package: rsync
Version: 2.6.4-6
Severity: grave
Tags: security
Justification: user security hole


Integer overflow in the receive_xattr function in the extended
attributes patch (xattr.c) for rsync before 2.6.8 might allow attackers
to execute arbitrary code via crafted extended attributes that trigger a
buffer overflow.

See http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-2083 for more details.


-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.11-1-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages rsync depends on:
ii  libc6                 2.3.2.ds1-22sarge3 GNU C Library: Shared libraries an
ii  libpopt0              1.7-5              lib for parsing cmdline parameters

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to