MGASA-2018-0103

Source
https://advisories.mageia.org/MGASA-2018-0103.html
Import Source
https://advisories.mageia.org/MGASA-2018-0103.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2018-0103
Related
Published
2018-01-31T20:47:38Z
Modified
2018-01-31T20:19:37Z
Summary
Updated rsync package fixes security vulnerability
Details

It was discovered that rsync incorrectly parsed certain arguments. An attacker could possibly use this to bypass arguments and execute arbitrary code (CVE-2018-5764).

References
Credits

Affected packages

Mageia:5 / rsync

Package

Name
rsync
Purl
pkg:rpm/mageia/rsync?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.1-5.4.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:6 / rsync

Package

Name
rsync
Purl
pkg:rpm/mageia/rsync?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.2-1.3.mga6

Ecosystem specific

{
    "section": "core"
}