SUSE-SU-2025:0166-1

Source
https://www.suse.com/support/update/announcement/2025/suse-su-20250166-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:0166-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2025:0166-1
Related
Published
2025-01-17T16:09:43Z
Modified
2025-01-17T16:09:43Z
Summary
Security update for rsync
Details

This update for rsync fixes the following issues:

  • CVE-2024-12085: leak of uninitialized stack data on the server leading to possible ASLR bypass. (bsc#1234101)
  • CVE-2024-12086: leak of a client machine's file contents through the processing of checksum data. (bsc#1234102)
  • CVE-2024-12087: arbitrary file overwrite possible on clients when symlink syncing is enabled. (bsc#1234103)
  • CVE-2024-12088: bypass of the --safe-links flag may allow the placement of unsafe symlinks in a client. (bsc#1234104)
  • CVE-2024-12747: Fixed a race condition in handling symbolic links. (bsc#1235475)
References

Affected packages

SUSE:Linux Enterprise Server 12 SP5-LTSS / rsync

Package

Name
rsync
Purl
pkg:rpm/suse/rsync&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.3-3.22.1

Ecosystem specific

{
    "binaries": [
        {
            "rsync": "3.1.3-3.22.1"
        }
    ]
}

SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5 / rsync

Package

Name
rsync
Purl
pkg:rpm/suse/rsync&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.3-3.22.1

Ecosystem specific

{
    "binaries": [
        {
            "rsync": "3.1.3-3.22.1"
        }
    ]
}