rsync is vulnerable to access control bypass. The parse_arguments
function in options.c
does not prevent multiple --protect-args uses and allows remote attackers to bypass the argument-sanitization protection mechanism.
CPE | Name | Operator | Version |
---|---|---|---|
rsync:3.4 | eq | 3.1.2-r2 | |
rsync:stretch | eq | 3.1.2-1+deb9u2 |
www.securityfocus.com/bid/102803
www.securitytracker.com/id/1040276
download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS
git.samba.org/rsync.git/?p=rsync.git;a=commit;h=7706303828fcde524222babb2833864a4bd09e07
lists.debian.org/debian-lts-announce/2018/01/msg00021.html
lists.debian.org/debian-lts-announce/2019/03/msg00027.html
lists.debian.org/debian-lts-announce/2021/11/msg00028.html
security.gentoo.org/glsa/201805-04
usn.ubuntu.com/3543-1/