Hi,

> See https://github.com/librsync/librsync/issues/5 .  librsync uses MD4
> as part of syncing; given the low strength and size of MD4, and the
> relative ease of computing collisions/preimages, that makes librsync
> unsafe to use on untrusted data, such as when running a duplicity
> backup.
>
> The upstream fix involves changing the signature format to use a strong
> hash.  The new version of librsync supports reading the old signature
> format, but always writes the new one.  So, fixing this has some of the
> same implications as Berkeley DB upgrades.  In particular, any
> applications using librsync and its data format across multiple systems
> will require upgrading any readers along with writers.  I'd suggest
> coordinating this with the reverse dependencies of librsync1.

Although a genuine issue, the fix is indeed too invasive to deploy in a
stable release and requires something of a transition. We should therefore
start this in sid for stretch.


Cheers,
Thijs


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to