From 4f2d7949f03e1c198bc888f2d05f421d35c57e21 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 9 Oct 2017 18:53:29 +0100 Subject: reinit the tree, so we can have metadata --- metadata/glsa/glsa-201702-05.xml | 47 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 metadata/glsa/glsa-201702-05.xml (limited to 'metadata/glsa/glsa-201702-05.xml') diff --git a/metadata/glsa/glsa-201702-05.xml b/metadata/glsa/glsa-201702-05.xml new file mode 100644 index 000000000000..fbb7d90b41c6 --- /dev/null +++ b/metadata/glsa/glsa-201702-05.xml @@ -0,0 +1,47 @@ + + + + Lsyncd: Remote execution of arbitrary code + A vulnerability in Lsyncd allows execution of arbitrary code. + lsyncd + 2017-02-10 + 2017-02-10: 1 + 529678 + local, remote + + + 2.1.6 + 2.1.6 + + + +

A daemon to synchronize local directories using rsync.

+
+ +

default-rsyncssh.lua in Lsyncd performed insufficient sanitising of + filenames. +

+
+ +

An attacker, able to control files processed by Lsyncd, could possibly + execute arbitrary code with the privileges of the process or cause a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Lsyncd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/lsyncd-2.1.6" + +
+ + CVE-2014-8990 + + b-man + whissi +
-- cgit v1.2.3