Summary: | <app-admin/lsyncd-2.1.6: command injection through backticks in a filename | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | dschridde+gentoobugs, maintainer-needed, patrick |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1165078 | ||
Whiteboard: | B2 [glsa cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 562898 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2014-11-18 11:15:25 UTC
CVE-2014-8990 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8990): default-rsyncssh.lua in Lsyncd 2.1.5 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a filename. 2.1.6 is in tree GLSA request filed. This issue was resolved and addressed in GLSA 201702-05 at https://security.gentoo.org/glsa/201702-05 by GLSA coordinator Thomas Deutschmann (whissi). |