isync is vulnerable to remote code execution. An unchecked pointer cast allows a malicious or compromised server to write an arbitrary integer value past the end of a heap-allocated structure by issuing an unexpected APPENDUID response. This behavior can be exploited to execute arbitrary code on the client.
www.openwall.com/lists/oss-security/2021/06/07/1
bugzilla.redhat.com/show_bug.cgi?id=1961710
bugzilla.redhat.com/show_bug.cgi?id=1967397
github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/
lists.debian.org/debian-lts-announce/2022/07/msg00001.html
lists.fedoraproject.org/archives/list/[email protected]/message/RPIDLIJKNRJHUVBCL7QGAPAAVPIHQGXK/
lists.fedoraproject.org/archives/list/[email protected]/message/U75UFEWRAZYKVL5NHMPBUOLWN3WXTOEI/
security-tracker.debian.org/tracker/CVE-2021-3578
security.gentoo.org/glsa/202208-15
www.openwall.com/lists/oss-security/2021/06/07/1