On Sat, Feb 16, 2019 at 12:33:08PM +0000, Debian Bug Tracking System wrote: > Processing commands for [email protected]: > > > severity 776246 grave > Bug #776246 [librsync1] MD4 collision/preimage attacks (CVE-2014-8242) > Severity set to 'grave' from 'important' > > thanks > Stopping processing here. > > Please contact me if you need assistance. Fixing this requires a transition and removing or patching rdiff-backup so
Checking reverse dependencies...
# Broken Depends:
burp: burp [amd64 arm64 armel armhf i386 kfreebsd-amd64 kfreebsd-i386 mips
mips64el mipsel ppc64el s390x]
csync2: csync2
duplicity: duplicity
rdiff-backup: rdiff-backup
# Broken Build-Depends:
burp: librsync-dev
csync2: librsync-dev
duplicity: librsync-dev (>= 0.9.6)
rdiff
rdiff-backup: librsync-dev
Unfortunately I was too demotivated by the initial state of new librsync
(1.0+) and the API breakage affecting rdiff-backup to proceed with this
during the release cycle.
--
WBR, wRAR
signature.asc
Description: PGP signature

