Bug 2330672 (CVE-2024-12087) - CVE-2024-12087 rsync: Path traversal vulnerability in rsync
Summary: CVE-2024-12087 rsync: Path traversal vulnerability in rsync
Keywords:
Status: NEW
Alias: CVE-2024-12087
Deadline: 2025-01-14
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2337976 2337977 2337978 2337979 2337980
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-12-05 21:26 UTC by OSIDB Bzimport
Modified: 2025-12-17 01:22 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2025:2691 0 None None None 2025-03-12 15:58:06 UTC
Red Hat Product Errata RHBA-2025:2694 0 None None None 2025-03-12 16:02:54 UTC
Red Hat Product Errata RHBA-2025:2797 0 None None None 2025-03-13 15:13:47 UTC
Red Hat Product Errata RHBA-2025:2807 0 None None None 2025-03-13 16:38:27 UTC
Red Hat Product Errata RHBA-2025:2921 0 None None None 2025-03-17 14:43:03 UTC
Red Hat Product Errata RHBA-2025:3083 0 None None None 2025-03-20 14:33:39 UTC
Red Hat Product Errata RHBA-2025:7930 0 None None None 2025-05-19 06:56:09 UTC
Red Hat Product Errata RHSA-2025:23154 0 None None None 2025-12-15 01:54:55 UTC
Red Hat Product Errata RHSA-2025:23235 0 None None None 2025-12-16 11:01:14 UTC
Red Hat Product Errata RHSA-2025:23407 0 None None None 2025-12-17 00:11:23 UTC
Red Hat Product Errata RHSA-2025:23415 0 None None None 2025-12-17 01:22:33 UTC
Red Hat Product Errata RHSA-2025:23416 0 None None None 2025-12-17 00:07:35 UTC
Red Hat Product Errata RHSA-2025:2600 0 None None None 2025-03-11 00:17:19 UTC
Red Hat Product Errata RHSA-2025:7050 0 None None None 2025-05-13 09:47:04 UTC

Description OSIDB Bzimport 2024-12-05 21:26:38 UTC
When the syncing of symbolic links is enabled, either through the -l or -a (--archive) flags, a malicious server can make the client write arbitrary files outside of the destination directory.

Comment 2 errata-xmlrpc 2025-03-11 00:17:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:2600 https://access.redhat.com/errata/RHSA-2025:2600

Comment 4 errata-xmlrpc 2025-05-13 09:47:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:7050 https://access.redhat.com/errata/RHSA-2025:7050

Comment 5 errata-xmlrpc 2025-12-15 01:54:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:23154 https://access.redhat.com/errata/RHSA-2025:23154

Comment 6 errata-xmlrpc 2025-12-16 11:01:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:23235 https://access.redhat.com/errata/RHSA-2025:23235

Comment 7 errata-xmlrpc 2025-12-17 00:07:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6 Extended Lifecycle Support  - EXTENSION

Via RHSA-2025:23416 https://access.redhat.com/errata/RHSA-2025:23416

Comment 8 errata-xmlrpc 2025-12-17 00:11:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:23407 https://access.redhat.com/errata/RHSA-2025:23407

Comment 9 errata-xmlrpc 2025-12-17 01:22:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2025:23415 https://access.redhat.com/errata/RHSA-2025:23415


Note You need to log in before you can comment on or make changes to this bug.