Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 5843-1] rsync security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 5843-1] rsync security update


Chronologisch Thread  
  • From: Salvatore Bonaccorso <carnil AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 5843-1] rsync security update
  • Date: Tue, 14 Jan 2025 18:21:45 +0000
  • Authentication-results: lists.piratenpartei.de; dkim=none; spf=none (lists.piratenpartei.de: domain of "bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org" has no SPF policy when checking 82.195.75.100) smtp.mailfrom="bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org"; dmarc=none
  • List-archive: https://lists.debian.org/msgid-search/E1tXlXt-001Ly3-Cr AT seger.debian.org
  • List-id: <debian-security-announce.lists.debian.org>
  • List-url: <http://lists.debian.org/debian-security-announce/>
  • Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version: Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=EGWeTeIb1NbinfkK/95WRSOaLs6h1+bkMMdE90TLfT8=; b=rB v9W0J3SYTPzLUmLZAO1QNY9dpG7Fi1rLvfaX30Mb+x0Xrcs0ezNNRU+m3y9BKzucxq1UxJaLCBC3V pwoRIbqyR4xzbipt6sjPTfM2WbDtTXP8K27IYvy9SGnGOVwncpYmt5ifzUdrDAvqiT5XowmemTmI+ NyQPsDWaOs0lc4LP5knsxXasXz33/+pGoP03iTHqUAJGogGzF22nn2emiLjOUXsz9AgURltBSi4i6 XlMsISqT6AG/jC7GtSrijCDClpmxWMgrHFqT1ZUIYIc58H0y9+ySimV/0LvMpDEIbssB2/yEsH5cn I8+HFhUCHZGoqu2fIvUZnk6Z3oS5KrWA==;
  • Old-return-path: <carnil AT seger.debian.org>
  • Priority: urgent
  • Resent-date: Tue, 14 Jan 2025 18:22:17 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <-6YlnS9QkpJ.A.RrLO.ZtqhnB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5843-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
January 14, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : rsync
CVE ID : CVE-2024-12084 CVE-2024-12085 CVE-2024-12086 CVE-2024-12087
CVE-2024-12088 CVE-2024-12747

Several vulnerabilities were discovered in rsync, a fast, versatile,
remote (and local) file-copying tool.

CVE-2024-12084

Simon Scannell, Pedro Gallegos and Jasiel Spelman discovered a
heap-based buffer overflow vulnerability due to improper handling of
attacker-controlled checksum lengths. A remote attacker can take
advantage of this flaw for code execution.

CVE-2024-12085

Simon Scannell, Pedro Gallegos and Jasiel Spelman reported a flaw in
the way rsync compares file checksums, allowing a remote attacker to
trigger an information leak.

CVE-2024-12086

Simon Scannell, Pedro Gallegos and Jasiel Spelman discovered a flaw
which would result in a server leaking contents of an arbitrary file
from the client's machine.

CVE-2024-12087

Simon Scannell, Pedro Gallegos and Jasiel Spelman reported a path
traversal vulnerability in the rsync daemon affecting the
--inc-recursive option, which could allow a server to write files
outside of the client's intended destination directory.

CVE-2024-12088

Simon Scannell, Pedro Gallegos and Jasiel Spelman reported that when
using the --safe-links option, rsync fails to properly verify if a
symbolic link destination contains another symbolic link with it,
resulting in path traversal and arbitrary file write outside of the
desired directory.

CVE-2024-12747

Aleksei Gorban "loqpa" discovered a race condition when handling
symbolic links resulting in an information leak which may enable
escalation of privileges.

For the stable distribution (bookworm), these problems have been fixed in
version 3.2.7-1+deb12u1.

We recommend that you upgrade your rsync packages.

For the detailed security status of rsync please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/rsync

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=M61D
-----END PGP SIGNATURE-----



  • [IT-SecNots] [SECURITY] [DSA 5843-1] rsync security update, Salvatore Bonaccorso, 14.01.2025

Archiv bereitgestellt durch MHonArc 2.6.19+.

Seitenanfang