[v3.1] lsyncd: command injection (CVE-2014-8990)
default-rsyncssh.lua in Lsyncd 2.1.5 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
References:
•CONFIRM: http://seclists.org/oss-sec/2014/q4/699
•MLIST:[oss-security] 20141119 CVE request: lsyncd command injection
•URL: http://www.openwall.com/lists/oss-security/2014/11/19/1
•MLIST:[oss-security] 20141120 Re: CVE request: lsyncd command
injection
•URL: http://www.openwall.com/lists/oss-security/2014/11/20/5
•CONFIRM:
https://github.com/axkibe/lsyncd/commit/18f02ad013b41a72753912155ae2ba72f2a53e52
•CONFIRM:
https://github.com/axkibe/lsyncd/commit/e6016b3748370878778b8f0b568d5281cc248aa4
•CONFIRM: https://github.com/axkibe/lsyncd/issues/220
•FEDORA:FEDORA-2014-15373
•URL:
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145131.html
•FEDORA:FEDORA-2014-15393
•URL:
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145114.html
•BID:71179
•URL: http://www.securityfocus.com/bid/71179
(from redmine: issue id 3723, created on 2015-01-23, closed on 2017-05-17)
- Relations:
- parent #3719
- Changesets:
- Revision cf8d2d1f by Natanael Copa on 2015-01-23T14:19:05Z:
main/lsyncd: fix CVE-2014-8990
fixes #3723
(cherry picked from commit 655d521104ae64806748d619c3e3394c4974aa55)