From 65fec6a186e2bb160bebe96875bb39ee8dc71d95 Mon Sep 17 00:00:00 2001 From: Simon Lefort Date: Wed, 24 Jul 2024 09:26:15 +0200 Subject: [PATCH] Update 1.2.8.md Add option for port (easier to see where to change if user use a custom port). --- doc/POST_UPGRADE.d/1.2.8.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/POST_UPGRADE.d/1.2.8.md b/doc/POST_UPGRADE.d/1.2.8.md index 1041730..1700ab8 100644 --- a/doc/POST_UPGRADE.d/1.2.8.md +++ b/doc/POST_UPGRADE.d/1.2.8.md @@ -1,7 +1,7 @@ [Borg pre-version 1.2.5 had CVE in archive format](https://github.com/borgbackup/borg/blob/1.2.8/docs/changes.rst#pre-125-archives-spoofing-vulnerability-cve-2023-36811). One liner to check if you're affected is: ```sh -sudo env BORG_RSH="ssh -i /root/.ssh/id___APP___ed25519 -oStrictHostKeyChecking=yes " BORG_PASSPHRASE="$(sudo yunohost app setting __APP__ passphrase)" BORG_RELOCATED_REPO_ACCESS_IS_OK=yes BORG_REPO="$(sudo yunohost app setting __APP__ repository)" __INSTALL_DIR__/venv/bin/borg upgrade --show-rc --check-tam $BORG_REPO +sudo env BORG_RSH="ssh -i /root/.ssh/id___APP___ed25519 -p 22 -oStrictHostKeyChecking=yes " BORG_PASSPHRASE="$(sudo yunohost app setting __APP__ passphrase)" BORG_RELOCATED_REPO_ACCESS_IS_OK=yes BORG_REPO="$(sudo yunohost app setting __APP__ repository)" __INSTALL_DIR__/venv/bin/borg upgrade --show-rc --check-tam $BORG_REPO ``` Consult the linked documentation on how to interpret the result.