Количество 33
Количество 33
RLSA-2025:7050
Moderate: rsync security update
RLSA-2025:2600
Moderate: rsync security update
ELSA-2025-7050
ELSA-2025-7050: rsync security update (MODERATE)
ELSA-2025-2600
ELSA-2025-2600: rsync security update (MODERATE)
SUSE-SU-2025:0166-1
Security update for rsync
SUSE-SU-2025:0165-1
Security update for rsync
SUSE-SU-2025:0157-1
Security update for rsync
SUSE-SU-2025:0156-1
Security update for rsync
ROS-20250203-04
Множественные уязвимости rsync
CVE-2024-12087
A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.
CVE-2024-12087
A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.
CVE-2024-12087
A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.
CVE-2024-12087
CVE-2024-12087
A path traversal vulnerability exists in rsync. It stems from behavior ...
GHSA-9x68-7qq6-v523
A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.
ELSA-2025-23415
ELSA-2025-23415: rsync security update (MODERATE)
BDU:2025-00377
Уязвимость конфигурации --inc-recursive демона rsyncd утилиты для передачи и синхронизации файлов Rsync, позволяющая нарушителю записывать произвольные файлы
CVE-2024-12747
A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.
CVE-2024-12747
A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.
CVE-2024-12747
A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2025:7050 Moderate: rsync security update | 4 месяца назад | |||
RLSA-2025:2600 Moderate: rsync security update | 9 месяцев назад | |||
ELSA-2025-7050 ELSA-2025-7050: rsync security update (MODERATE) | 9 месяцев назад | |||
ELSA-2025-2600 ELSA-2025-2600: rsync security update (MODERATE) | 11 месяцев назад | |||
SUSE-SU-2025:0166-1 Security update for rsync | около 1 года назад | |||
SUSE-SU-2025:0165-1 Security update for rsync | около 1 года назад | |||
SUSE-SU-2025:0157-1 Security update for rsync | около 1 года назад | |||
SUSE-SU-2025:0156-1 Security update for rsync | около 1 года назад | |||
ROS-20250203-04 Множественные уязвимости rsync | CVSS3: 9.8 | около 1 года назад | ||
CVE-2024-12087 A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client. | CVSS3: 6.5 | 2% Низкий | около 1 года назад | |
CVE-2024-12087 A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client. | CVSS3: 6.5 | 2% Низкий | около 1 года назад | |
CVE-2024-12087 A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client. | CVSS3: 6.5 | 2% Низкий | около 1 года назад | |
CVSS3: 7.5 | 2% Низкий | около 1 года назад | ||
CVE-2024-12087 A path traversal vulnerability exists in rsync. It stems from behavior ... | CVSS3: 6.5 | 2% Низкий | около 1 года назад | |
GHSA-9x68-7qq6-v523 A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client. | CVSS3: 6.5 | 2% Низкий | около 1 года назад | |
ELSA-2025-23415 ELSA-2025-23415: rsync security update (MODERATE) | около 1 месяца назад | |||
BDU:2025-00377 Уязвимость конфигурации --inc-recursive демона rsyncd утилиты для передачи и синхронизации файлов Rsync, позволяющая нарушителю записывать произвольные файлы | CVSS3: 6.5 | 2% Низкий | около 1 года назад | |
CVE-2024-12747 A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation. | CVSS3: 5.6 | 0% Низкий | около 1 года назад | |
CVE-2024-12747 A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation. | CVSS3: 5.6 | 0% Низкий | около 1 года назад | |
CVE-2024-12747 A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation. | CVSS3: 5.6 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу