On Mon 01 May 2006, Jay Kline wrote:

> Package: rsync
> Version: 2.6.4-6
> Severity: grave
> Tags: security
> Justification: user security hole
> 
> 
> Integer overflow in the receive_xattr function in the extended
> attributes patch (xattr.c) for rsync before 2.6.8 might allow attackers
> to execute arbitrary code via crafted extended attributes that trigger a
> buffer overflow.

Do you have reason to believe that Debian's rsync 2.6.4-6 has that patch
applied?


Paul Slootman


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to