[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 4015-1] rsync security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4015-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                    Thorsten Alteholz
January 14, 2025                              https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : rsync
Version        : 3.2.3-4+deb11u2
CVE ID         : CVE-2024-12085 CVE-2024-12086 CVE-2024-12087
                 CVE-2024-12088 CVE-2024-12747


Several vulnerabilities were discovered in rsync, a fast, versatile,
remote (and local) file-copying tool.

CVE-2024-12085

    Simon Scannell, Pedro Gallegos and Jasiel Spelman reported a flaw in
    the way rsync compares file checksums, allowing a remote attacker to
    trigger an information leak.

CVE-2024-12086

    Simon Scannell, Pedro Gallegos and Jasiel Spelman discovered a flaw
    which would result in a server leaking contents of an arbitrary file
    from the client's machine.

CVE-2024-12087

    Simon Scannell, Pedro Gallegos and Jasiel Spelman reported a path
    traversal vulnerability in the rsync daemon affecting the
    --inc-recursive option, which could allow a server to write files
    outside of the client's intended destination directory.

CVE-2024-12088

    Simon Scannell, Pedro Gallegos and Jasiel Spelman reported that when
    using the --safe-links option, rsync fails to properly verify if a
    symbolic link destination contains another symbolic link with it,
    resulting in path traversal and arbitrary file write outside of the
    desired directory.

CVE-2024-12747

    Aleksei Gorban "loqpa" discovered a race condition when handling
    symbolic links resulting in an information leak which may enable
    escalation of privileges.


For Debian 11 bullseye, these problems have been fixed in version
3.2.3-4+deb11u2.

We recommend that you upgrade your rsync packages.

For the detailed security status of rsync please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/rsync

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
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=U4Wr
-----END PGP SIGNATURE-----


Reply to: