Advisories


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2833-1                debian-lts[email protected]
https://www.debian.org/lts/security/                          Adrian Bunk
November 30, 2021                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : rsync
Version        : 3.1.2-1+deb9u3
CVE ID         : CVE-2018-5764
Debian Bug     : 887588

In rsync, a remote file-copying tool, remote attackers were able to 
bypass the argument-sanitization protection mechanism by passing 
additional --protect-args.

For Debian 9 stretch, this problem has been fixed in version
3.1.2-1+deb9u3.

We recommend that you upgrade your rsync packages.

For the detailed security status of rsync please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/rsync

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-2833-1: rsync security update

November 30, 2021
In rsync, a remote file-copying tool, remote attackers were able to bypass the argument-sanitization protection mechanism by passing additional --protect-args

Summary

For Debian 9 stretch, this problem has been fixed in version
3.1.2-1+deb9u3.

We recommend that you upgrade your rsync packages.

For the detailed security status of rsync please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/rsync

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Severity
Package : rsync
Version : 3.1.2-1+deb9u3
CVE ID : CVE-2018-5764
Debian Bug : 887588
In rsync, a remote file-copying tool, remote attackers were able to
bypass the argument-sanitization protection mechanism by passing
additional --protect-args.
Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.