Search CVE reports
1 – 10 of 40 results
Some fixes available 4 of 8
Rsync versionĀ 3.4.2 and prior contain a receiver-side out-of-bounds array read vulnerability in recv_files() in receiver.c that allows a malicious rsync server to crash the rsync client process. Attackers can exploit...
1 affected package
rsync
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| rsync | Fixed | Fixed | Fixed | Needs evaluation | Needs evaluation |
Some fixes available 4 of 8
Rsync versionĀ 3.4.2 and prior contain symlink race condition vulnerabilities in path-based system calls including chmod, lchown, utimes, rename, unlink, mkdir, symlink, mknod, link, rmdir, and lstat that allow local attackers to...
1 affected package
rsync
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| rsync | Fixed | Fixed | Fixed | Needs evaluation | Needs evaluation |
Some fixes available 4 of 8
The receiver's compressed-token decoder accumulated a 32-bit signed counter without overflow checking. A malicious sender can trigger an overflow that, with careful manipulation, leaks process memory contents to the attacker --...
1 affected package
rsync
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| rsync | Fixed | Fixed | Fixed | Needs evaluation | Needs evaluation |
Some fixes available 4 of 8
Rsync versionĀ 3.4.2 and prior contain an authorization bypass vulnerability in the rsync daemon's hostname-based access control list enforcement when configured with chroot. Attackers can bypass hostname-based deny rules...
1 affected package
rsync
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| rsync | Fixed | Fixed | Fixed | Needs evaluation | Needs evaluation |
Some fixes available 4 of 8
In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all)...
1 affected package
rsync
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| rsync | Fixed | Fixed | Fixed | Vulnerable | Vulnerable |
zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.
4 affected packages
zlib, rsync, klibc, zsync
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| zlib | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
| rsync | Not affected | Not affected | Not affected | Vulnerable | Vulnerable |
| klibc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
| zsync | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
zlib versions up to and including 1.3.1.2 include a global buffer overflow in the untgz utility located under contrib/untgz. The vulnerability is limited to the standalone demonstration utility and does not affect the core zlib...
4 affected packages
zlib, rsync, klibc, zsync
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| zlib | Not affected | Not affected | Not affected | Not affected | Not affected |
| rsync | Not affected | Not affected | Not affected | Not affected | Not affected |
| klibc | Not affected | Not affected | Not affected | Not affected | Not affected |
| zsync | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
Some fixes available 4 of 9
A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync...
1 affected package
rsync
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| rsync | Fixed | Fixed | Fixed | Needs evaluation | Needs evaluation |
A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular...
1 affected package
rsync
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| rsync | — | Fixed | Fixed | Fixed | Fixed |
A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a...
1 affected package
rsync
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| rsync | — | Fixed | Fixed | Fixed | Fixed |