DEBIAN-CVE-2004-0792

Source
https://security-tracker.debian.org/tracker/CVE-2004-0792
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2004-0792.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2004-0792
Upstream
Published
2004-10-20T04:00:00Z
Modified
2025-11-19T01:06:23.029224Z
Summary
[none]
Details

Directory traversal vulnerability in the sanitize_path function in util.c for rsync 2.6.2 and earlier, when chroot is disabled, allows attackers to read or write certain files.

References

Affected packages

Debian:11 / rsync

Package

Name
rsync
Purl
pkg:deb/debian/rsync?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.2-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / rsync

Package

Name
rsync
Purl
pkg:deb/debian/rsync?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.2-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / rsync

Package

Name
rsync
Purl
pkg:deb/debian/rsync?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.2-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / rsync

Package

Name
rsync
Purl
pkg:deb/debian/rsync?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.2-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}