This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsaid="201805-04">
<title>rsync: Arbitrary command execution</title>
<synopsis>A vulnerability in rsync might allow remote attackers to execute
arbitrary commands.
</synopsis>
<producttype="ebuild">rsync</product>
<announced>2018-05-08</announced>
<revisedcount="1">2018-05-08</revised>
<bug>646818</bug>
<access>remote</access>
<affected>
<packagename="net-misc/rsync"auto="yes"arch="*">
<unaffectedrange="ge">3.1.3</unaffected>
<vulnerablerange="lt">3.1.3</vulnerable>
</package>
</affected>
<background>
<p>File transfer program to keep remote files into sync.</p>
</background>
<description>
<p>A vulnerability was discovered in rsync’s parse_arguments function in
options.c.
</p>
</description>
<impacttype="normal">
<p>Remote attackers could possibly execute arbitrary commands with the
privilege of the process.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All rsync users should upgrade to the latest version:</p>