-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2833-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ Adrian Bunk November 30, 2021 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : rsync Version : 3.1.2-1+deb9u3 CVE ID : CVE-2018-5764 Debian Bug : 887588 In rsync, a remote file-copying tool, remote attackers were able to bypass the argument-sanitization protection mechanism by passing additional --protect-args. For Debian 9 stretch, this problem has been fixed in version 3.1.2-1+deb9u3. We recommend that you upgrade your rsync packages. For the detailed security status of rsync please refer to its security tracker page at: https://security-tracker.debian.org/tracker/rsync Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmGmlc4ACgkQiNJCh6LY mLFpsRAAu5epYQvH4sagJ7/94XaromONK2uzHEjh18xZ1b9uA7yz7oM7AFDMl9QL av0+rF4ObXUicdYxVSeKJVLQhN5jwUQccpd2XTZC7LkZ51/odDMu4JNkiBO29UvW 9gMRK712HMjbXfw97Z6KwD/Nsvj8bOa10kqgibbvSBw/GT98aR5qPqr4CJ5kNsbc 8O88iYSbHI/aABzuibGIpk+mPYeXlyNPZ6KWdnTqWQAr7r4KvuQz4f+W5Ymwq/yr Kov6BZjhTwT/TjdwBJL5o6+yRBm81ZDG9ULP+SEunC89FM+uYa75pqSVTrH+pkg9 FoH0eCx1GSeXYpzCgT9yqKzwNvHo5xqlqPImIYFJX1ar1lpNCeH5d5ClPVQ4IpKn sGq1aEhojynYoAQobBBRIehbAg+I5ZsDTJ2iabYkDzTaVbA5uQ7kd1sqBqdn7GPO cgw3wfog/ownbsvfiffXVAV+OnDt5LL+yqNxbNFnxqSf+J8578RdTs9Mh8By2N4R p4O8UoP/gebbQiwrCLjv6eJm3AGlZoCCfgjPTWXC9Qgs19MMZP0ZTHA6+TtB7Yq3 78323YqmrUbK+5SN8wB2W449A0Lg5k7Y/blJLyRH4TcHiX4RGxPP6yMVP8RVKSLp QnizEkkBBwg0w9P8hY85plHwCQBO4GRQ8l2izYST2lp2nslTeEk= =4ZSg -----END PGP SIGNATURE-----