Lsyncd: Remote execution of arbitrary code A vulnerability in Lsyncd allows execution of arbitrary code. lsyncd 2017-02-10 2017-02-10 529678 local, remote 2.1.6 2.1.6

A daemon to synchronize local directories using rsync.

default-rsyncssh.lua in Lsyncd performed insufficient sanitising of filenames.

An attacker, able to control files processed by Lsyncd, could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.

There is no known workaround at this time.

All Lsyncd users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/lsyncd-2.1.6"
CVE-2014-8990 b-man whissi