{"id":"MGASA-2017-0459","summary":"Updated rsync package fixes security vulnerability","details":"The receive_xattr function in xattrs.c in rsync 3.1.2 and\n3.1.3-development does not check for a trailing '\\0' character in an\nxattr name, which allows remote attackers to cause a denial of service\n(heap-based buffer over-read and application crash) or possibly have\nunspecified other impact by sending crafted data to the daemon.\n(CVE-2017-16548)\n","modified":"2026-01-30T04:05:33.915690Z","published":"2017-12-21T17:43:29Z","related":["CVE-2017-16548"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0459.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=22216"},{"type":"REPORT","url":"https://www.debian.org/security/2017/dsa-4068"}],"affected":[{"package":{"name":"rsync","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/rsync?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.1-5.3.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0459.json"}},{"package":{"name":"rsync","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/rsync?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.2-1.2.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0459.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}