RHBA-2025:6470
Vulnerability from csaf_redhat - Published: 2025-05-13 08:18 - Updated: 2026-04-14 21:41A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.
A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.
A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.
A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory.
A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rsync is now available for Red Hat Enterprise Linux 10.",
"title": "Topic"
},
{
"category": "general",
"text": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 10 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2025:6470",
"url": "https://access.redhat.com/errata/RHBA-2025:6470"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/10/html/10.0_release_notes/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/10/html/10.0_release_notes/index"
},
{
"category": "external",
"summary": "RHEL-71293",
"url": "https://issues.redhat.com/browse/RHEL-71293"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhba-2025_6470.json"
}
],
"title": "Red Hat Bug Fix Advisory: rsync bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-04-14T21:41:38+00:00",
"generator": {
"date": "2026-04-14T21:41:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHBA-2025:6470",
"initial_release_date": "2025-05-13T08:18:15+00:00",
"revision_history": [
{
"date": "2025-05-13T08:18:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-05-13T08:18:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-14T21:41:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.0"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.4.1-2.el10.src",
"product": {
"name": "rsync-0:3.4.1-2.el10.src",
"product_id": "rsync-0:3.4.1-2.el10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.4.1-2.el10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.4.1-2.el10.aarch64",
"product": {
"name": "rsync-0:3.4.1-2.el10.aarch64",
"product_id": "rsync-0:3.4.1-2.el10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.4.1-2.el10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.4.1-2.el10.aarch64",
"product": {
"name": "rsync-debugsource-0:3.4.1-2.el10.aarch64",
"product_id": "rsync-debugsource-0:3.4.1-2.el10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.4.1-2.el10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"product": {
"name": "rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"product_id": "rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.4.1-2.el10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.4.1-2.el10.ppc64le",
"product": {
"name": "rsync-0:3.4.1-2.el10.ppc64le",
"product_id": "rsync-0:3.4.1-2.el10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.4.1-2.el10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"product": {
"name": "rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"product_id": "rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.4.1-2.el10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"product": {
"name": "rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"product_id": "rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.4.1-2.el10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.4.1-2.el10.x86_64",
"product": {
"name": "rsync-0:3.4.1-2.el10.x86_64",
"product_id": "rsync-0:3.4.1-2.el10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.4.1-2.el10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.4.1-2.el10.x86_64",
"product": {
"name": "rsync-debugsource-0:3.4.1-2.el10.x86_64",
"product_id": "rsync-debugsource-0:3.4.1-2.el10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.4.1-2.el10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"product": {
"name": "rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"product_id": "rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.4.1-2.el10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.4.1-2.el10.s390x",
"product": {
"name": "rsync-0:3.4.1-2.el10.s390x",
"product_id": "rsync-0:3.4.1-2.el10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.4.1-2.el10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.4.1-2.el10.s390x",
"product": {
"name": "rsync-debugsource-0:3.4.1-2.el10.s390x",
"product_id": "rsync-debugsource-0:3.4.1-2.el10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.4.1-2.el10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.4.1-2.el10.s390x",
"product": {
"name": "rsync-debuginfo-0:3.4.1-2.el10.s390x",
"product_id": "rsync-debuginfo-0:3.4.1-2.el10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.4.1-2.el10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-daemon-0:3.4.1-2.el10.noarch",
"product": {
"name": "rsync-daemon-0:3.4.1-2.el10.noarch",
"product_id": "rsync-daemon-0:3.4.1-2.el10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-daemon@3.4.1-2.el10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rsync-rrsync-0:3.4.1-2.el10.noarch",
"product": {
"name": "rsync-rrsync-0:3.4.1-2.el10.noarch",
"product_id": "rsync-rrsync-0:3.4.1-2.el10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-rrsync@3.4.1-2.el10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-2.el10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64"
},
"product_reference": "rsync-0:3.4.1-2.el10.aarch64",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-2.el10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le"
},
"product_reference": "rsync-0:3.4.1-2.el10.ppc64le",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-2.el10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x"
},
"product_reference": "rsync-0:3.4.1-2.el10.s390x",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-2.el10.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src"
},
"product_reference": "rsync-0:3.4.1-2.el10.src",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-2.el10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64"
},
"product_reference": "rsync-0:3.4.1-2.el10.x86_64",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-daemon-0:3.4.1-2.el10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch"
},
"product_reference": "rsync-daemon-0:3.4.1-2.el10.noarch",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-2.el10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64"
},
"product_reference": "rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-2.el10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le"
},
"product_reference": "rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-2.el10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x"
},
"product_reference": "rsync-debuginfo-0:3.4.1-2.el10.s390x",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-2.el10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64"
},
"product_reference": "rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-2.el10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64"
},
"product_reference": "rsync-debugsource-0:3.4.1-2.el10.aarch64",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-2.el10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le"
},
"product_reference": "rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-2.el10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x"
},
"product_reference": "rsync-debugsource-0:3.4.1-2.el10.s390x",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-2.el10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64"
},
"product_reference": "rsync-debugsource-0:3.4.1-2.el10.x86_64",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-rrsync-0:3.4.1-2.el10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
},
"product_reference": "rsync-rrsync-0:3.4.1-2.el10.noarch",
"relates_to_product_reference": "AppStream-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-2.el10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64"
},
"product_reference": "rsync-0:3.4.1-2.el10.aarch64",
"relates_to_product_reference": "BaseOS-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-2.el10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le"
},
"product_reference": "rsync-0:3.4.1-2.el10.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-2.el10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x"
},
"product_reference": "rsync-0:3.4.1-2.el10.s390x",
"relates_to_product_reference": "BaseOS-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-2.el10.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src"
},
"product_reference": "rsync-0:3.4.1-2.el10.src",
"relates_to_product_reference": "BaseOS-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-2.el10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64"
},
"product_reference": "rsync-0:3.4.1-2.el10.x86_64",
"relates_to_product_reference": "BaseOS-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-daemon-0:3.4.1-2.el10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch"
},
"product_reference": "rsync-daemon-0:3.4.1-2.el10.noarch",
"relates_to_product_reference": "BaseOS-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-2.el10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64"
},
"product_reference": "rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"relates_to_product_reference": "BaseOS-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-2.el10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le"
},
"product_reference": "rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-2.el10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x"
},
"product_reference": "rsync-debuginfo-0:3.4.1-2.el10.s390x",
"relates_to_product_reference": "BaseOS-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-2.el10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64"
},
"product_reference": "rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"relates_to_product_reference": "BaseOS-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-2.el10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64"
},
"product_reference": "rsync-debugsource-0:3.4.1-2.el10.aarch64",
"relates_to_product_reference": "BaseOS-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-2.el10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le"
},
"product_reference": "rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-2.el10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x"
},
"product_reference": "rsync-debugsource-0:3.4.1-2.el10.s390x",
"relates_to_product_reference": "BaseOS-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-2.el10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64"
},
"product_reference": "rsync-debugsource-0:3.4.1-2.el10.x86_64",
"relates_to_product_reference": "BaseOS-10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-rrsync-0:3.4.1-2.el10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
},
"product_reference": "rsync-rrsync-0:3.4.1-2.el10.noarch",
"relates_to_product_reference": "BaseOS-10.0.GA"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Simon Scannell",
"Pedro Gallegos",
"Jasiel Spelman"
],
"organization": "Google"
}
],
"cve": "CVE-2024-12084",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-12-05T09:32:44.653000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2330527"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsync: Heap Buffer Overflow in Rsync due to Improper Checksum Length Handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability only affects a limited range of Rsync versions, rsync-3.2.7 and rsync-3.3.0. Red Hat Enterprise Linux does not ship these versions of Rsync and is not affected.\n\nRed Hat considers the severity of this vulnerability to be Critical only in cases where anonymous read access is allowed. Depending on the configuration and implementation choices, the severity may be significantly reduced for your organization.\n\nIn all supported versions of Red Hat Enterprise Linux, Rsync is not configured to run as a service by default.\n\nThere are two different methods for utilizing Rsync from a remote system: contacting an Rsync daemon directly with TCP or using a remote-shell program as the transport (such as ssh or rsh). The risk of this vulnerability changes depending on which connection method is used.\n\nThe default configuration of an Rsync daemon (rsyncd) running as a service does not require authentication. While rsyncd can be configured to require users to provide valid credentials, anonymous read access is a common configuration used by file sharing and mirroring hosts. The capabilities of the rsyncd process may vary depending on the user configured to run the Rsync daemon. In this scenario, an attacker only requires anonymous read access to a Rsync server in order to trigger this vulnerability. \n\nRemote-shell programs provide a layer of defense because they enforce users to have valid credentials while initiating the shell connection. When Rsync is invoked via this method, it spawns as a child of the session and will not remain running indefinitely. Since the process is spawned within the security context of the user, an attacker who is able to exploit this vulnerability remains restricted to the capabilities of the user account used to initiate the session. Authentication and network restrictions significantly reduce the attack surface and restricting permissions for remote shell users is always encouraged to limit the impact of compromised credentials.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-12084"
},
{
"category": "external",
"summary": "RHBZ#2330527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330527"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12084"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12084",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12084"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/952657",
"url": "https://kb.cert.org/vuls/id/952657"
}
],
"release_date": "2025-01-14T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:18:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2025:6470"
},
{
"category": "workaround",
"details": "Red Hat recommends filtering untrusted connections to Rsync via firewall rules on the host and on network firewall appliances.\n\nAdditionally, systems which only need to provide remote Rsync access to users with known identities can enable authentication using the ```auth users``` parameter in their rsyncd configuration file (rsyncd.conf). \n\nSystems that provide anonymous read access to hosted files via Rsync, such as mirror hosts, do not have reasonable mitigation options available. We strongly urge operators using vulnerable versions of Rsync to update as soon as possible.",
"product_ids": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "rsync: Heap Buffer Overflow in Rsync due to Improper Checksum Length Handling"
},
{
"acknowledgments": [
{
"names": [
"Pedro Gallegos",
"Simon Scannell",
"Jasiel Spelman"
],
"organization": "Google"
}
],
"cve": "CVE-2024-12085",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2024-12-05T12:06:36.594000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2330539"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsync: Info Leak via Uninitialized Stack Contents",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as having Important impact as it helps bypass Address Space Layout Randomization (ASLR). ASLR is a memory protection system which makes the exploitation of memory corruption vulnerabilities more difficult.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-12085"
},
{
"category": "external",
"summary": "RHBZ#2330539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330539"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12085"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/952657",
"url": "https://kb.cert.org/vuls/id/952657"
}
],
"release_date": "2025-01-14T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:18:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2025:6470"
},
{
"category": "workaround",
"details": "Seeing as this vulnerability relies on information leakage coming from the presence of data in the uninitialized memory of the `sum2` buffer, a potential mitigation involves compiling rsync with the `-ftrivial-auto-var-init=zero` option set. This mitigates the issue because it initializes the `sum2` variable\u0027s memory with zeroes to prevent uninitialized memory disclosure.",
"product_ids": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "rsync: Info Leak via Uninitialized Stack Contents"
},
{
"acknowledgments": [
{
"names": [
"Jasiel Spelman",
"Simon Scannell",
"Pedro Gallegos"
],
"organization": "Google"
}
],
"cve": "CVE-2024-12086",
"cwe": {
"id": "CWE-390",
"name": "Detection of Error Condition Without Action"
},
"discovery_date": "2024-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2330577"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client\u0027s machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsync: rsync server leaks arbitrary client files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as moderate rather than important because it requires the attacker to control the rsync server, which limits the scope of exploitation to scenarios where the client interacts with untrusted or compromised servers. Additionally, the attack is non-trivial, as it relies on the attacker sending specially crafted checksum values and deducing file contents byte-by-byte based on the client\u2019s responses. This makes the exploit more complex and time-consuming compared to direct file access vulnerabilities. Furthermore, the impact is limited to file data enumeration, and it does not allow arbitrary code execution or privilege escalation on the client.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-12086"
},
{
"category": "external",
"summary": "RHBZ#2330577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330577"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12086"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/952657",
"url": "https://kb.cert.org/vuls/id/952657"
}
],
"release_date": "2025-01-14T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:18:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2025:6470"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rsync: rsync server leaks arbitrary client files"
},
{
"acknowledgments": [
{
"names": [
"Simon Scannell",
"Pedro Gallegos",
"Jasiel Spelman"
],
"organization": "Google"
}
],
"cve": "CVE-2024-12087",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2024-12-05T21:23:24.139000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2330672"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client\u0027s intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsync: Path traversal vulnerability in rsync",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat rates this flaw to have moderate severity as it depends on specific configurations for the attack to succeed, symbolic link syncing must be enabled (explicitly by providing the `--links` option or implicitly such as with `--archive`) and the client must connect to a malicious or compromised server.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-12087"
},
{
"category": "external",
"summary": "RHBZ#2330672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330672"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12087",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12087"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/952657",
"url": "https://kb.cert.org/vuls/id/952657"
}
],
"release_date": "2025-01-14T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:18:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2025:6470"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rsync: Path traversal vulnerability in rsync"
},
{
"acknowledgments": [
{
"names": [
"Simon Scannell",
"Jasiel Spelman",
"Pedro Gallegos"
],
"organization": "Google"
}
],
"cve": "CVE-2024-12088",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2024-12-05T21:55:22.700000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2330676"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsync: --safe-links option bypass leads to path traversal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability requires user interaction to be triggered, as the rsync client must first establish a connection/have access to the malicious rsync server (at least anonymous read-access).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-12088"
},
{
"category": "external",
"summary": "RHBZ#2330676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330676"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12088",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12088"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/952657",
"url": "https://kb.cert.org/vuls/id/952657"
}
],
"release_date": "2025-01-14T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:18:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2025:6470"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rsync: --safe-links option bypass leads to path traversal"
},
{
"acknowledgments": [
{
"names": [
"Aleksei Gorban \"loqpa\""
]
}
],
"cve": "CVE-2024-12747",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2024-12-18T07:12:52.493000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2332968"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rsync. This vulnerability arises from a race condition during rsync\u0027s handling of symbolic links. Rsync\u0027s default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsync: Race Condition in rsync Handling Symbolic Links",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-12747"
},
{
"category": "external",
"summary": "RHBZ#2332968",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2332968"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12747",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12747"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/952657",
"url": "https://kb.cert.org/vuls/id/952657"
}
],
"release_date": "2025-01-14T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:18:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2025:6470"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.src",
"AppStream-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"AppStream-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"AppStream-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.src",
"BaseOS-10.0.GA:rsync-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-daemon-0:3.4.1-2.el10.noarch",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debuginfo-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.aarch64",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.ppc64le",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.s390x",
"BaseOS-10.0.GA:rsync-debugsource-0:3.4.1-2.el10.x86_64",
"BaseOS-10.0.GA:rsync-rrsync-0:3.4.1-2.el10.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rsync: Race Condition in rsync Handling Symbolic Links"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.