A vulnerability in Lsyncd allows execution of arbitrary code.
Package | app-admin/lsyncd on all architectures |
---|---|
Affected versions | < 2.1.6 |
Unaffected versions | >= 2.1.6 |
A daemon to synchronize local directories using rsync.
default-rsyncssh.lua in Lsyncd performed insufficient sanitising of filenames.
An attacker, able to control files processed by Lsyncd, could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.
There is no known workaround at this time.
All Lsyncd users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/lsyncd-2.1.6"
Release date
February 10, 2017
Latest revision
February 10, 2017: 1
Severity
normal
Exploitable
local, remote
Bugzilla entries