Gentoo: GLSA-202405-13: borgmatic: Shell InjectionSecurity Advisory Updates
Summary
Prevent shell injection attacks within the PostgreSQL hook, the MongoDB
hook, the SQLite hook, the "borgmatic borg" action, and command hook
variable/constant interpolation.
Resolution
All borgmatic users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-backup/borgmatic-1.8.8"
References
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202405-13
Concerns
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
Synopsis
A vulnerability has been discovered in borgmatic, which can lead to
shell injection.
Background
borgmatic is simple, configuration-driven backup software for servers
and workstations.
Affected Packages
Package Vulnerable Unaffected
-------------------- ------------ ------------
app-backup/borgmatic < 1.8.8 >= 1.8.8
Impact
Shell injection may be used in several borgmatic backends to execute
arbitrary code.
Workaround
There is no known workaround at this time.