Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-14387 (GCVE-0-2020-14387)
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1875549 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1875549 | Issue Tracking, Patch, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:46:33.953Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875549" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "rsync", "vendor": "n/a", "versions": [ { "status": "affected", "version": "rsync 3.2.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certificate for another hostname which could compromise confidentiality and integrity of data transmitted using rsync-ssl. The highest threat from this vulnerability is to data confidentiality and integrity. This flaw affects rsync versions before 3.2.4." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-297", "description": "CWE-297", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-27T19:44:53", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875549" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-14387", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "rsync", "version": { "version_data": [ { "version_value": "rsync 3.2.4" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certificate for another hostname which could compromise confidentiality and integrity of data transmitted using rsync-ssl. The highest threat from this vulnerability is to data confidentiality and integrity. This flaw affects rsync versions before 3.2.4." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-297" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1875549", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875549" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-14387", "datePublished": "2021-05-27T19:44:53", "dateReserved": "2020-06-17T00:00:00", "dateUpdated": "2024-08-04T12:46:33.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-14387\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2021-05-27T20:15:07.873\",\"lastModified\":\"2024-11-21T05:03:09.177\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certificate for another hostname which could compromise confidentiality and integrity of data transmitted using rsync-ssl. The highest threat from this vulnerability is to data confidentiality and integrity. This flaw affects rsync versions before 3.2.4.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un fallo en rsync en versiones desde 3.2.0pre1.\u0026#xa0;Rsync comprueba inapropiadamente el certificado con vulnerabilidad de discrepancia de host.\u0026#xa0;Un atacante remoto no autenticado podr\u00eda explotar el fallo llevando a cabo un de tipo ataque de tipo man-in-the-middle usando un certificado v\u00e1lido para otro nombre de host que podr\u00eda comprometer la confidencialidad e integridad de los datos transmitidos usando rsync-ssl.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la confidencialidad e integridad de los datos.\u0026#xa0;Este fallo afecta a rsync versiones anteriores a 3.2.4\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-297\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.2.1\",\"versionEndExcluding\":\"3.2.4\",\"matchCriteriaId\":\"45922B1C-D968-46DD-8EE6-F0B22F085733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:rsync:3.2.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3E08234-5E6E-444D-B466-7FDADB951199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:rsync:3.2.0:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3FA9537-95CA-4B6D-8162-6DC5D4B0BD32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:rsync:3.2.0:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"06F27E32-CB3F-4140-AFBD-1A65031D42F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:rsync:3.2.0:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB9157B-D013-400A-A5F3-8088676586C8\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1875549\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1875549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
opensuse-su-2024:11308-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "rsync-3.2.3-2.6 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the rsync-3.2.3-2.6 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11308", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11308-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2007-4091 page", "url": "https://www.suse.com/security/cve/CVE-2007-4091/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-6199 page", "url": "https://www.suse.com/security/cve/CVE-2007-6199/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16548 page", "url": "https://www.suse.com/security/cve/CVE-2017-16548/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5764 page", "url": "https://www.suse.com/security/cve/CVE-2018-5764/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14387 page", "url": "https://www.suse.com/security/cve/CVE-2020-14387/" } ], "title": "rsync-3.2.3-2.6 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11308-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "rsync-3.2.3-2.6.aarch64", "product": { "name": "rsync-3.2.3-2.6.aarch64", "product_id": "rsync-3.2.3-2.6.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rsync-3.2.3-2.6.ppc64le", "product": { "name": "rsync-3.2.3-2.6.ppc64le", "product_id": "rsync-3.2.3-2.6.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rsync-3.2.3-2.6.s390x", "product": { "name": "rsync-3.2.3-2.6.s390x", "product_id": "rsync-3.2.3-2.6.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rsync-3.2.3-2.6.x86_64", "product": { "name": "rsync-3.2.3-2.6.x86_64", "product_id": "rsync-3.2.3-2.6.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-2.6.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rsync-3.2.3-2.6.aarch64" }, "product_reference": "rsync-3.2.3-2.6.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-2.6.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rsync-3.2.3-2.6.ppc64le" }, "product_reference": "rsync-3.2.3-2.6.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-2.6.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rsync-3.2.3-2.6.s390x" }, "product_reference": "rsync-3.2.3-2.6.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-2.6.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rsync-3.2.3-2.6.x86_64" }, "product_reference": "rsync-3.2.3-2.6.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-4091" } ], "notes": [ { "category": "general", "text": "Multiple off-by-one errors in the sender.c in rsync 2.6.9 might allow remote attackers to execute arbitrary code via directory names that are not properly handled when calling the f_name function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:rsync-3.2.3-2.6.aarch64", "openSUSE Tumbleweed:rsync-3.2.3-2.6.ppc64le", "openSUSE Tumbleweed:rsync-3.2.3-2.6.s390x", "openSUSE Tumbleweed:rsync-3.2.3-2.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-4091", "url": "https://www.suse.com/security/cve/CVE-2007-4091" }, { "category": "external", "summary": "SUSE Bug 279866 for CVE-2007-4091", "url": "https://bugzilla.suse.com/279866" }, { "category": "external", "summary": "SUSE Bug 294073 for CVE-2007-4091", "url": "https://bugzilla.suse.com/294073" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:rsync-3.2.3-2.6.aarch64", "openSUSE Tumbleweed:rsync-3.2.3-2.6.ppc64le", "openSUSE Tumbleweed:rsync-3.2.3-2.6.s390x", "openSUSE Tumbleweed:rsync-3.2.3-2.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-4091" }, { "cve": "CVE-2007-6199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-6199" } ], "notes": [ { "category": "general", "text": "rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module\u0027s hierarchy.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:rsync-3.2.3-2.6.aarch64", "openSUSE Tumbleweed:rsync-3.2.3-2.6.ppc64le", "openSUSE Tumbleweed:rsync-3.2.3-2.6.s390x", "openSUSE Tumbleweed:rsync-3.2.3-2.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-6199", "url": "https://www.suse.com/security/cve/CVE-2007-6199" }, { "category": "external", "summary": "SUSE Bug 345507 for CVE-2007-6199", "url": "https://bugzilla.suse.com/345507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:rsync-3.2.3-2.6.aarch64", "openSUSE Tumbleweed:rsync-3.2.3-2.6.ppc64le", "openSUSE Tumbleweed:rsync-3.2.3-2.6.s390x", "openSUSE Tumbleweed:rsync-3.2.3-2.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2007-6199" }, { "cve": "CVE-2017-16548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16548" } ], "notes": [ { "category": "general", "text": "The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing \u0027\\0\u0027 character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:rsync-3.2.3-2.6.aarch64", "openSUSE Tumbleweed:rsync-3.2.3-2.6.ppc64le", "openSUSE Tumbleweed:rsync-3.2.3-2.6.s390x", "openSUSE Tumbleweed:rsync-3.2.3-2.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16548", "url": "https://www.suse.com/security/cve/CVE-2017-16548" }, { "category": "external", "summary": "SUSE Bug 1066644 for CVE-2017-16548", "url": "https://bugzilla.suse.com/1066644" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:rsync-3.2.3-2.6.aarch64", "openSUSE Tumbleweed:rsync-3.2.3-2.6.ppc64le", "openSUSE Tumbleweed:rsync-3.2.3-2.6.s390x", "openSUSE Tumbleweed:rsync-3.2.3-2.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:rsync-3.2.3-2.6.aarch64", "openSUSE Tumbleweed:rsync-3.2.3-2.6.ppc64le", "openSUSE Tumbleweed:rsync-3.2.3-2.6.s390x", "openSUSE Tumbleweed:rsync-3.2.3-2.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-16548" }, { "cve": "CVE-2018-5764", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5764" } ], "notes": [ { "category": "general", "text": "The parse_arguments function in options.c in rsyncd in rsync before 3.1.3 does not prevent multiple --protect-args uses, which allows remote attackers to bypass an argument-sanitization protection mechanism.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:rsync-3.2.3-2.6.aarch64", "openSUSE Tumbleweed:rsync-3.2.3-2.6.ppc64le", "openSUSE Tumbleweed:rsync-3.2.3-2.6.s390x", "openSUSE Tumbleweed:rsync-3.2.3-2.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5764", "url": "https://www.suse.com/security/cve/CVE-2018-5764" }, { "category": "external", "summary": "SUSE Bug 1076503 for CVE-2018-5764", "url": "https://bugzilla.suse.com/1076503" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:rsync-3.2.3-2.6.aarch64", "openSUSE Tumbleweed:rsync-3.2.3-2.6.ppc64le", "openSUSE Tumbleweed:rsync-3.2.3-2.6.s390x", "openSUSE Tumbleweed:rsync-3.2.3-2.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:rsync-3.2.3-2.6.aarch64", "openSUSE Tumbleweed:rsync-3.2.3-2.6.ppc64le", "openSUSE Tumbleweed:rsync-3.2.3-2.6.s390x", "openSUSE Tumbleweed:rsync-3.2.3-2.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5764" }, { "cve": "CVE-2020-14387", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14387" } ], "notes": [ { "category": "general", "text": "A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certificate for another hostname which could compromise confidentiality and integrity of data transmitted using rsync-ssl. The highest threat from this vulnerability is to data confidentiality and integrity. This flaw affects rsync versions before 3.2.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:rsync-3.2.3-2.6.aarch64", "openSUSE Tumbleweed:rsync-3.2.3-2.6.ppc64le", "openSUSE Tumbleweed:rsync-3.2.3-2.6.s390x", "openSUSE Tumbleweed:rsync-3.2.3-2.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14387", "url": "https://www.suse.com/security/cve/CVE-2020-14387" }, { "category": "external", "summary": "SUSE Bug 1176160 for CVE-2020-14387", "url": "https://bugzilla.suse.com/1176160" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:rsync-3.2.3-2.6.aarch64", "openSUSE Tumbleweed:rsync-3.2.3-2.6.ppc64le", "openSUSE Tumbleweed:rsync-3.2.3-2.6.s390x", "openSUSE Tumbleweed:rsync-3.2.3-2.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:rsync-3.2.3-2.6.aarch64", "openSUSE Tumbleweed:rsync-3.2.3-2.6.ppc64le", "openSUSE Tumbleweed:rsync-3.2.3-2.6.s390x", "openSUSE Tumbleweed:rsync-3.2.3-2.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14387" } ] }
cnvd-2021-44957
Vulnerability from cnvd
Title: Rsync rsync-ssl存在未明漏洞
Description:
Rsync是一套用于类Unix系统中的数据镜像备份应用程序。
Rsync的rsync-ssl中存在安全漏洞,攻击者可利用该漏洞影响机密性和完整性。
Severity: 中
Patch Name: Rsync rsync-ssl存在未明漏洞的补丁
Patch Description:
Rsync是一套用于类Unix系统中的数据镜像备份应用程序。
Rsync的rsync-ssl中存在安全漏洞,攻击者可利用该漏洞影响机密性和完整性。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://bugzilla.redhat.com/show_bug.cgi?id=1875549
Reference: https://nvd.nist.gov/vuln/detail/CVE-2020-14387
Name | Rsync rsync <3.2.4 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2020-14387" } }, "description": "Rsync\u662f\u4e00\u5957\u7528\u4e8e\u7c7bUnix\u7cfb\u7edf\u4e2d\u7684\u6570\u636e\u955c\u50cf\u5907\u4efd\u5e94\u7528\u7a0b\u5e8f\u3002\n\nRsync\u7684rsync-ssl\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5f71\u54cd\u673a\u5bc6\u6027\u548c\u5b8c\u6574\u6027\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1875549", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2021-44957", "openTime": "2021-06-25", "patchDescription": "Rsync\u662f\u4e00\u5957\u7528\u4e8e\u7c7bUnix\u7cfb\u7edf\u4e2d\u7684\u6570\u636e\u955c\u50cf\u5907\u4efd\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nRsync\u7684rsync-ssl\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5f71\u54cd\u673a\u5bc6\u6027\u548c\u5b8c\u6574\u6027\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Rsync rsync-ssl\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Rsync rsync \u003c3.2.4" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-14387", "serverity": "\u4e2d", "submitTime": "2021-05-28", "title": "Rsync rsync-ssl\u5b58\u5728\u672a\u660e\u6f0f\u6d1e" }
WID-SEC-W-2024-1049
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Rsync ist ein Tool, um Dateien und Verzeichnisse zu synchronisieren.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Rsync ausnutzen, um Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1049 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2024-1049.json" }, { "category": "self", "summary": "WID-SEC-2024-1049 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1049" }, { "category": "external", "summary": "NIST Database vom 2021-06-09", "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14387" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-22 vom 2024-05-08", "url": "https://security.gentoo.org/glsa/202405-22" } ], "source_lang": "en-US", "title": "Rsync: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen", "tracking": { "current_release_date": "2024-05-07T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:08:35.591+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1049", "initial_release_date": "2021-06-09T22:00:00.000+00:00", "revision_history": [ { "date": "2021-06-09T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-05-07T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Gentoo aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c3.2.4", "product": { "name": "Open Source Rsync \u003c3.2.4", "product_id": "T019541" } } ], "category": "product_name", "name": "Rsync" } ], "category": "vendor", "name": "Open Source" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14387", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Rsync. Der Fehler besteht aufgrund einer unsachgem\u00e4\u00dfen Validierung von Zertifikaten und einem daraus resultierenden m\u00f6glichen Man-in-the-Middle-Angriff. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T012167" ] }, "release_date": "2021-06-09T22:00:00.000+00:00", "title": "CVE-2020-14387" } ] }
wid-sec-w-2024-1049
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Rsync ist ein Tool, um Dateien und Verzeichnisse zu synchronisieren.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Rsync ausnutzen, um Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1049 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2024-1049.json" }, { "category": "self", "summary": "WID-SEC-2024-1049 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1049" }, { "category": "external", "summary": "NIST Database vom 2021-06-09", "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14387" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-22 vom 2024-05-08", "url": "https://security.gentoo.org/glsa/202405-22" } ], "source_lang": "en-US", "title": "Rsync: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen", "tracking": { "current_release_date": "2024-05-07T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:08:35.591+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1049", "initial_release_date": "2021-06-09T22:00:00.000+00:00", "revision_history": [ { "date": "2021-06-09T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-05-07T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Gentoo aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c3.2.4", "product": { "name": "Open Source Rsync \u003c3.2.4", "product_id": "T019541" } } ], "category": "product_name", "name": "Rsync" } ], "category": "vendor", "name": "Open Source" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14387", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Rsync. Der Fehler besteht aufgrund einer unsachgem\u00e4\u00dfen Validierung von Zertifikaten und einem daraus resultierenden m\u00f6glichen Man-in-the-Middle-Angriff. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T012167" ] }, "release_date": "2021-06-09T22:00:00.000+00:00", "title": "CVE-2020-14387" } ] }
gsd-2020-14387
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-14387", "description": "A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certificate for another hostname which could compromise confidentiality and integrity of data transmitted using rsync-ssl. The highest threat from this vulnerability is to data confidentiality and integrity. This flaw affects rsync versions before 3.2.4.", "id": "GSD-2020-14387", "references": [ "https://www.suse.com/security/cve/CVE-2020-14387.html", "https://security.archlinux.org/CVE-2020-14387" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-14387" ], "details": "A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certificate for another hostname which could compromise confidentiality and integrity of data transmitted using rsync-ssl. The highest threat from this vulnerability is to data confidentiality and integrity. This flaw affects rsync versions before 3.2.4.", "id": "GSD-2020-14387", "modified": "2023-12-13T01:22:00.263213Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-14387", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "rsync", "version": { "version_data": [ { "version_value": "rsync 3.2.4" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certificate for another hostname which could compromise confidentiality and integrity of data transmitted using rsync-ssl. The highest threat from this vulnerability is to data confidentiality and integrity. This flaw affects rsync versions before 3.2.4." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-297" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1875549", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875549" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:samba:rsync:3.2.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:rsync:3.2.0:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:rsync:3.2.0:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:rsync:3.2.0:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.2.4", "versionStartIncluding": "3.2.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-14387" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certificate for another hostname which could compromise confidentiality and integrity of data transmitted using rsync-ssl. The highest threat from this vulnerability is to data confidentiality and integrity. This flaw affects rsync versions before 3.2.4." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-297" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1875549", "refsource": "MISC", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875549" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2 } }, "lastModifiedDate": "2021-06-09T14:54Z", "publishedDate": "2021-05-27T20:15Z" } } }
suse-ru-2023:3370-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Recommended update for rsync", "title": "Title of the patch" }, { "category": "description", "text": "This update for rsync fixes the following issues:\n\n- Update to version 3.2.3 (jsc#SLE-21252, jsc#PED-3146)\n- Add support for using --atimes to preserve atime of files in destination sync (jsc#PED-3145)\n- Remove SuSEfirewall2 service as this was replaced by firewalld (which already provides a rsyncd service).\n- Fix --delay-updates never updates after interruption (bsc#1204538)\n- Arbitrary file write vulnerability via do_server_recv function (bsc#1201840, CVE-2022-29154)\n- rsync-ssl: Verify the hostname in the certificate when using openssl. (bsc#1176160, CVE-2020-14387)\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-3370,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3370,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3370,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3370,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3370,SUSE-SLE-Product-RT-15-SP3-2023-3370,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3370,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3370,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3370,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3370,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3370,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3370,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3370,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3370,SUSE-SUSE-MicroOS-5.1-2023-3370,SUSE-SUSE-MicroOS-5.2-2023-3370,SUSE-Storage-7.1-2023-3370", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-ru-2023_3370-1.json" }, { "category": "self", "summary": "URL for SUSE-RU-2023:3370-1", "url": "https://www.suse.com/support/update/announcement//suse-ru-20233370-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-RU-2023:3370-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-August/031115.html" }, { "category": "self", "summary": "SUSE Bug 1176160", "url": "https://bugzilla.suse.com/1176160" }, { "category": "self", "summary": "SUSE Bug 1201840", "url": "https://bugzilla.suse.com/1201840" }, { "category": "self", "summary": "SUSE Bug 1204538", "url": "https://bugzilla.suse.com/1204538" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14387 page", "url": "https://www.suse.com/security/cve/CVE-2020-14387/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29154 page", "url": "https://www.suse.com/security/cve/CVE-2022-29154/" } ], "title": "Recommended update for rsync", "tracking": { "current_release_date": "2023-08-22T09:53:12Z", "generator": { "date": "2023-08-22T09:53:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-RU-2023:3370-1", "initial_release_date": "2023-08-22T09:53:12Z", "revision_history": [ { "date": "2023-08-22T09:53:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "rsync-3.2.3-150000.4.23.2.aarch64", "product": { "name": "rsync-3.2.3-150000.4.23.2.aarch64", "product_id": "rsync-3.2.3-150000.4.23.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rsync-3.2.3-150000.4.23.2.i586", "product": { "name": "rsync-3.2.3-150000.4.23.2.i586", "product_id": "rsync-3.2.3-150000.4.23.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "rsync-3.2.3-150000.4.23.2.ppc64le", "product": { "name": "rsync-3.2.3-150000.4.23.2.ppc64le", "product_id": "rsync-3.2.3-150000.4.23.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rsync-3.2.3-150000.4.23.2.s390x", "product": { "name": "rsync-3.2.3-150000.4.23.2.s390x", "product_id": "rsync-3.2.3-150000.4.23.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rsync-3.2.3-150000.4.23.2.x86_64", "product": { "name": "rsync-3.2.3-150000.4.23.2.x86_64", "product_id": "rsync-3.2.3-150000.4.23.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 15 SP3", "product": { "name": "SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_rt:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.2", "product": { "name": "SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.2" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.2", "product": { "name": "SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.aarch64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.aarch64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:rsync-3.2.3-150000.4.23.2.aarch64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.aarch64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.aarch64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le" }, "product_reference": "rsync-3.2.3-150000.4.23.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.s390x" }, "product_reference": "rsync-3.2.3-150000.4.23.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.aarch64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le" }, "product_reference": "rsync-3.2.3-150000.4.23.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.s390x" }, "product_reference": "rsync-3.2.3-150000.4.23.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.aarch64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le" }, "product_reference": "rsync-3.2.3-150000.4.23.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.s390x" }, "product_reference": "rsync-3.2.3-150000.4.23.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rsync-3.2.3-150000.4.23.2.ppc64le" }, "product_reference": "rsync-3.2.3-150000.4.23.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rsync-3.2.3-150000.4.23.2.ppc64le" }, "product_reference": "rsync-3.2.3-150000.4.23.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:rsync-3.2.3-150000.4.23.2.ppc64le" }, "product_reference": "rsync-3.2.3-150000.4.23.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.ppc64le as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.ppc64le" }, "product_reference": "rsync-3.2.3-150000.4.23.2.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.s390x as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.s390x" }, "product_reference": "rsync-3.2.3-150000.4.23.2.s390x", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.aarch64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.s390x" }, "product_reference": "rsync-3.2.3-150000.4.23.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.aarch64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.s390x as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.s390x" }, "product_reference": "rsync-3.2.3-150000.4.23.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:rsync-3.2.3-150000.4.23.2.aarch64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "rsync-3.2.3-150000.4.23.2.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:rsync-3.2.3-150000.4.23.2.x86_64" }, "product_reference": "rsync-3.2.3-150000.4.23.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14387", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14387" } ], "notes": [ { "category": "general", "text": "A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certificate for another hostname which could compromise confidentiality and integrity of data transmitted using rsync-ssl. The highest threat from this vulnerability is to data confidentiality and integrity. This flaw affects rsync versions before 3.2.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Enterprise Storage 7.1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Manager Proxy 4.2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14387", "url": "https://www.suse.com/security/cve/CVE-2020-14387" }, { "category": "external", "summary": "SUSE Bug 1176160 for CVE-2020-14387", "url": "https://bugzilla.suse.com/1176160" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Enterprise Storage 7.1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Manager Proxy 4.2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Enterprise Storage 7.1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Manager Proxy 4.2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-22T09:53:12Z", "details": "important" } ], "title": "CVE-2020-14387" }, { "cve": "CVE-2022-29154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29154" } ], "notes": [ { "category": "general", "text": "An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Enterprise Storage 7.1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Manager Proxy 4.2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29154", "url": "https://www.suse.com/security/cve/CVE-2022-29154" }, { "category": "external", "summary": "SUSE Bug 1201840 for CVE-2022-29154", "url": "https://bugzilla.suse.com/1201840" }, { "category": "external", "summary": "SUSE Bug 1202970 for CVE-2022-29154", "url": "https://bugzilla.suse.com/1202970" }, { "category": "external", "summary": "SUSE Bug 1202998 for CVE-2022-29154", "url": "https://bugzilla.suse.com/1202998" }, { "category": "external", "summary": "SUSE Bug 1203401 for CVE-2022-29154", "url": "https://bugzilla.suse.com/1203401" }, { "category": "external", "summary": "SUSE Bug 1203727 for CVE-2022-29154", "url": "https://bugzilla.suse.com/1203727" }, { "category": "external", "summary": "SUSE Bug 1203789 for CVE-2022-29154", "url": "https://bugzilla.suse.com/1203789" }, { "category": "external", "summary": "SUSE Bug 1204119 for CVE-2022-29154", "url": "https://bugzilla.suse.com/1204119" }, { "category": "external", "summary": "SUSE Bug 1205072 for CVE-2022-29154", "url": "https://bugzilla.suse.com/1205072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Enterprise Storage 7.1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Manager Proxy 4.2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Enterprise Storage 7.1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Micro 5.1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Micro 5.2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Manager Proxy 4.2:rsync-3.2.3-150000.4.23.2.x86_64", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.ppc64le", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.s390x", "SUSE Manager Server 4.2:rsync-3.2.3-150000.4.23.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-08-22T09:53:12Z", "details": "important" } ], "title": "CVE-2022-29154" } ] }
fkie_cve-2020-14387
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1875549 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1875549 | Issue Tracking, Patch, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:*", "matchCriteriaId": "45922B1C-D968-46DD-8EE6-F0B22F085733", "versionEndExcluding": "3.2.4", "versionStartIncluding": "3.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:samba:rsync:3.2.0:-:*:*:*:*:*:*", "matchCriteriaId": "E3E08234-5E6E-444D-B466-7FDADB951199", "vulnerable": true }, { "criteria": "cpe:2.3:a:samba:rsync:3.2.0:pre1:*:*:*:*:*:*", "matchCriteriaId": "D3FA9537-95CA-4B6D-8162-6DC5D4B0BD32", "vulnerable": true }, { "criteria": "cpe:2.3:a:samba:rsync:3.2.0:pre2:*:*:*:*:*:*", "matchCriteriaId": "06F27E32-CB3F-4140-AFBD-1A65031D42F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:samba:rsync:3.2.0:pre3:*:*:*:*:*:*", "matchCriteriaId": "5EB9157B-D013-400A-A5F3-8088676586C8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certificate for another hostname which could compromise confidentiality and integrity of data transmitted using rsync-ssl. The highest threat from this vulnerability is to data confidentiality and integrity. This flaw affects rsync versions before 3.2.4." }, { "lang": "es", "value": "Se encontr\u00f3 un fallo en rsync en versiones desde 3.2.0pre1.\u0026#xa0;Rsync comprueba inapropiadamente el certificado con vulnerabilidad de discrepancia de host.\u0026#xa0;Un atacante remoto no autenticado podr\u00eda explotar el fallo llevando a cabo un de tipo ataque de tipo man-in-the-middle usando un certificado v\u00e1lido para otro nombre de host que podr\u00eda comprometer la confidencialidad e integridad de los datos transmitidos usando rsync-ssl.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la confidencialidad e integridad de los datos.\u0026#xa0;Este fallo afecta a rsync versiones anteriores a 3.2.4" } ], "id": "CVE-2020-14387", "lastModified": "2024-11-21T05:03:09.177", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-27T20:15:07.873", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875549" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875549" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-297" } ], "source": "secalert@redhat.com", "type": "Primary" } ] }
ghsa-5gm2-c485-9q6q
Vulnerability from github
A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certificate for another hostname which could compromise confidentiality and integrity of data transmitted using rsync-ssl. The highest threat from this vulnerability is to data confidentiality and integrity. This flaw affects rsync versions before 3.2.4.
{ "affected": [], "aliases": [ "CVE-2020-14387" ], "database_specific": { "cwe_ids": [ "CWE-297" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-05-27T20:15:00Z", "severity": "HIGH" }, "details": "A flaw was found in rsync in versions since 3.2.0pre1. Rsync improperly validates certificate with host mismatch vulnerability. A remote, unauthenticated attacker could exploit the flaw by performing a man-in-the-middle attack using a valid certificate for another hostname which could compromise confidentiality and integrity of data transmitted using rsync-ssl. The highest threat from this vulnerability is to data confidentiality and integrity. This flaw affects rsync versions before 3.2.4.", "id": "GHSA-5gm2-c485-9q6q", "modified": "2022-05-24T19:03:34Z", "published": "2022-05-24T19:03:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14387" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875549" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.