On Sat, 26 Jan 2002, Peter Billson wrote:

>   I just applied the security fix to rsync and now it is dumping core.
> Before I report this as a bug, I thought I'd check to see if anyone else
> is having trouble.

I am now receiving:
 Warning: unexpected read size of 0 in map_ptr

This is with rsync (netbsd package) 2.3.1 (not updated) connecting with
rsync (debian package) 2.3.2-1.3. (Going either way.)

I never use rsync as a daemon. The rsync announcement says "Although this
vulnerability is primarily important for people running rsync daemons, it
is not impossible that a malicious rsync server could use it to attack a
client who connects over either ssh or port 873."

So does this mean that it doesn't really matter if you upgrade if you
don't use a rsync daemon? (Or why would you have a "malicious" rsync
server?)

  Jeremy C. Reed


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to