First published: Thu Feb 12 2015(Updated: )
rsync. A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks.
Credit: gaojianfeng gaojianfeng gaojianfeng gaojianfeng gaojianfeng cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | =3.1.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Oracle Solaris SPARC | =10.0 | |
Oracle Solaris SPARC | =11.3 | |
tvOS | <13.4.5 | 13.4.5 |
macOS Catalina | <10.15.5 | 10.15.5 |
macOS Mojave | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <13.5 | 13.5 |
Apple iOS, iPadOS, and watchOS | <13.5 | 13.5 |
Apple iOS, iPadOS, and watchOS | <6.2.5 | 6.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2014-9512 is a vulnerability in rsync that involves a validation issue in the handling of symlinks.
macOS Catalina version 10.15.6 is affected by CVE-2014-9512.
There is no specific remedy mentioned for CVE-2014-9512 on macOS Mojave.
Yes, the remedy for CVE-2014-9512 on watchOS is version 6.2.5.
You can find more information about CVE-2014-9512 on the Apple support page.