{"id":"MGASA-2025-0019","summary":"Updated rsync packages fix security vulnerabilities","details":"Heap buffer overflow in rsync due to improper checksum length handling.\n(CVE-2024-12084)\nInfo leak via uninitialized stack contents. (CVE-2024-12085)\nRsync server leaks arbitrary client files. (CVE-2024-12086)\nPath traversal vulnerability in rsync. (CVE-2024-12087)\nRsync --safe-links option bypass leads to path traversal.\n(CVE-2024-12088)\nRace condition in rsync handling symbolic links. (CVE-2024-12747)\n","modified":"2026-02-02T01:37:19.621527Z","published":"2025-01-22T03:19:16Z","related":["CVE-2024-12084","CVE-2024-12085","CVE-2024-12086","CVE-2024-12087","CVE-2024-12088","CVE-2024-12747"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2025-0019.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=33920"},{"type":"REPORT","url":"https://www.openwall.com/lists/oss-security/2025/01/14/3"},{"type":"REPORT","url":"https://lists.debian.org/debian-security-announce/2025/msg00004.html"},{"type":"REPORT","url":"https://ubuntu.com/security/notices/USN-7206-1"},{"type":"REPORT","url":"https://ubuntu.com/security/notices/USN-7206-2"}],"affected":[{"package":{"name":"rsync","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/rsync?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.7-1.2.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2025-0019.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}