Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-55682.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-55682
Upstream
Published
2025-01-14T18:15:25Z
Modified
2026-04-01T05:18:42.790660Z
Summary
CVE-2024-12087 affecting package rsync for versions less than 3.4.1-1
Details

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the --inc-recursive option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the --inc-recursive option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

References

Affected packages

Azure Linux:3 / rsync

Package

Name
rsync
Purl
pkg:rpm/azure-linux/rsync

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.1-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-55682.json"