A vulnerability in Lsyncd allows execution of arbitrary code.
|Package||app-admin/lsyncd on all architectures|
|Affected versions||< 2.1.6|
|Unaffected versions||>= 2.1.6|
A daemon to synchronize local directories using rsync.
default-rsyncssh.lua in Lsyncd performed insufficient sanitising of filenames.
An attacker, able to control files processed by Lsyncd, could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.
There is no known workaround at this time.
All Lsyncd users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/lsyncd-2.1.6"
February 10, 2017
February 10, 2017: 1