First published: Thu Feb 12 2015(Updated: )
rsync. A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks.
Credit: gaojianfeng gaojianfeng gaojianfeng gaojianfeng gaojianfeng cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple watchOS | <6.2.5 | 6.2.5 |
Apple macOS Catalina | <10.15.5 | 10.15.5 |
Apple Mojave | ||
Apple High Sierra | ||
Apple tvOS | <13.4.5 | 13.4.5 |
Apple iOS | <13.5 | 13.5 |
Apple iPadOS | <13.5 | 13.5 |
Samba Rsync | =3.1.1 | |
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 | |
Oracle Solaris | =10.0 | |
Oracle Solaris | =11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2014-9512 is a vulnerability in rsync that involves a validation issue in the handling of symlinks.
macOS Catalina version 10.15.6 is affected by CVE-2014-9512.
There is no specific remedy mentioned for CVE-2014-9512 on macOS Mojave.
Yes, the remedy for CVE-2014-9512 on watchOS is version 6.2.5.
You can find more information about CVE-2014-9512 on the Apple support page.