From ${URL} : It was reported [1] that lsyncd is vulnerable to command injection. If a filename has "`" (backticks), what betwwen backticks will be executed with lsyncd process privileges. Upstream patch is at [2]. [1]: https://github.com/axkibe/lsyncd/issues/220 [2]: https://github.com/creshal/lsyncd/commit/18f02ad013b41a72753912155ae2ba72f2a53e52 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
CVE-2014-8990 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8990): default-rsyncssh.lua in Lsyncd 2.1.5 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
2.1.6 is in tree
GLSA request filed.
This issue was resolved and addressed in GLSA 201702-05 at https://security.gentoo.org/glsa/201702-05 by GLSA coordinator Thomas Deutschmann (whissi).