
Six significant security vulnerabilities have been identified in Rsync, a widely-used file synchronization tool for Unix systems. These flaws could potentially enable attackers to execute arbitrary code and compromise system security.
Key Vulnerabilities:
1. CVE-2024-12084 (CVSS 9.8): Critical heap-buffer overflow vulnerability
2. CVE-2024-12085 (CVSS 7.5): Information leak through uninitialized stack contents
3. CVE-2024-12086 (CVSS 6.1): Server-side file leak vulnerability
4. CVE-2024-12087 (CVSS 6.5): Path traversal vulnerability
5. CVE-2024-12088 (CVSS 6.5): Safe-links bypass vulnerability
6. CVE-2024-12747 (CVSS 5.6): Symbolic-link race condition
Impact:
– Attackers can potentially control malicious servers
– Read/write access to client files
– Extraction of sensitive data (SSH keys)
– Malicious code execution through file overwrites
Security Fix:
– Patches available in Rsync version 3.4.0
Temporary Mitigations:
– For CVE-2024-12084: Disable SHA* support
– For CVE-2024-12085: Compile with zero stack contents initialization
The vulnerabilities were discovered by Google Cloud Vulnerability Research team members and independent security researcher Aleksei Gorban. Users are strongly advised to update to the latest version immediately.