{"id":36023,"date":"2025-01-15T14:16:40","date_gmt":"2025-01-15T06:16:40","guid":{"rendered":"https:\/\/www.deepin.org\/?p=36023"},"modified":"2025-01-15T17:04:59","modified_gmt":"2025-01-15T09:04:59","slug":"rsync-vulnerability-announcement","status":"publish","type":"post","link":"https:\/\/www.deepin.org.cn\/en\/rsync-vulnerability-announcement\/","title":{"rendered":"RSYNC Vulnerability Announcement (Upgrade Patch Pushed)"},"content":{"rendered":"<img loading=\"lazy\" class=\"alignnone size-full wp-image-36024\" src=\"https:\/\/www.deepin.org\/wp-content\/uploads\/2025\/01\/en.png\" alt=\"\" width=\"900\" height=\"383\" srcset=\"https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2025\/01\/en.png 900w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2025\/01\/en-300x128.png 300w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2025\/01\/en-150x64.png 150w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2025\/01\/en-768x327.png 768w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2025\/01\/en-24x10.png 24w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2025\/01\/en-36x15.png 36w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2025\/01\/en-48x20.png 48w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/p>\n<div class=\"markdown-container\" data-v-191eb8d1=\"\" data-v-5d235d8f=\"\">\n<div class=\"markdown\" data-v-53cd9be5=\"\" data-v-191eb8d1=\"\">\n<p class=\"paragraph\">At 02:25 Beijing time on January 15, 2025, security researcher Nick Tait reported six security vulnerabilities in rsync on the oss-security mailing list. Among them, the most severe vulnerability allows attackers to execute arbitrary code on the server simply by having anonymous read access to the rsync server (such as a public mirror).<\/p>\n<\/div>\n<div class=\"markdown-container\" data-v-191eb8d1=\"\" data-v-5d235d8f=\"\">\n<div class=\"markdown\" data-v-53cd9be5=\"\" data-v-191eb8d1=\"\">\n<h1 class=\"paragraph\"><strong>Vulnerability Details:<\/strong><\/h1>\n<ol start=\"1\">\n<li>\n<div class=\"paragraph\">CVE-2024-12084 (CVSS: 9.8): There is a heap buffer overflow vulnerability in rsync due to improper handling of checksum lengths. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), attackers can perform out-of-bounds writes in the sum2 buffer. Affected versions: 3.2.7 to 3.4.0.<\/div>\n<\/li>\n<li>\n<div class=\"paragraph\">CVE-2024-12085 (CVSS: 7.5): In the rsync daemon, when comparing file checksums, attackers can manipulate the checksum length, leading to comparisons with uninitialized memory, thereby leaking one byte of uninitialized stack data each time. Affected versions: All versions.<\/div>\n<\/li>\n<li>\n<div class=\"paragraph\">CVE-2024-12086 (CVSS: 6.1): The rsync server may leak arbitrary file contents from the client. During the process of copying files from the client to the server, the server sends local data checksums for the client to compare. By sending specially crafted checksum values, attackers may reconstruct the data of these files byte by byte based on the client's responses. Affected versions: All versions.<\/div>\n<\/li>\n<li>\n<div class=\"paragraph\">CVE-2024-12087 (CVSS: 6.5): There is a path traversal vulnerability in rsync. When the --inc-recursive option is enabled (many clients enable this by default), attackers can exploit this vulnerability to perform path traversal attacks. Affected versions: All versions.<\/div>\n<\/li>\n<li>\n<div class=\"paragraph\">CVE-2024-12088 (CVSS: 6.5): The --copy-dest option in rsync has a symbolic link attack vulnerability. Attackers can exploit this vulnerability to overwrite files in the target directory. Affected versions: All versions.<\/div>\n<\/li>\n<li>\n<div class=\"paragraph\">CVE-2024-12089 (CVSS: 6.5): The --backup-dir option in rsync has a symbolic link attack vulnerability. Attackers can exploit this vulnerability to create symbolic links in the backup directory, leading to file overwrites. Affected versions: All versions.<\/div>\n<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"markdown-container\" data-v-191eb8d1=\"\" data-v-5d235d8f=\"\">\n<div class=\"markdown\" data-v-53cd9be5=\"\" data-v-191eb8d1=\"\">\n<h1 class=\"paragraph\"><strong>Am I Affected?<\/strong><\/h1>\n<p class=\"paragraph\">If you have never installed the rsync package (which is not pre-installed in deepin 23), you are not affected by these vulnerabilities.<\/p>\n<p class=\"paragraph\">If you have never manually enabled any rsync-related services, you are not affected by these vulnerabilities.<\/p>\n<h2 class=\"paragraph\"><strong>Mitigation Measures<\/strong><\/h2>\n<p class=\"paragraph\">The upstream maintainers of rsync have prepared patches for the aforementioned vulnerabilities, which will be included in the upcoming upstream rsync 3.4.0 release (the deepin patched version is: 3.3.0+ds1-3).<\/p>\n<h2 class=\"paragraph\"><strong>Temporary Workarounds<\/strong><\/h2>\n<p class=\"paragraph\">We strongly recommend updating to the new version. If you wish to defer the update, you can take the following temporary measures:<\/p>\n<p class=\"paragraph\">If you do not require the use of checksums in rsync, you can disable the checksum option on the rsync server side. To do this:<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol start=\"1\">\n<li>\n<div class=\"paragraph\">Edit <code data-v-f1fd9079=\"\" data-v-191eb8d1=\"\" class=\"segment-code-inline\">\/etc\/rsyncd.conf<\/code><\/div>\n<\/li>\n<li>\n<div class=\"paragraph\">Add the line <code data-v-f1fd9079=\"\" data-v-191eb8d1=\"\" class=\"segment-code-inline\">refuse options = checksum<\/code> to the configuration file.<\/div>\n<\/li>\n<li>\n<div class=\"paragraph\">Restart the rsync service (<code data-v-f1fd9079=\"\" data-v-191eb8d1=\"\" class=\"segment-code-inline\">systemctl restart rsync<\/code>).<\/div>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"markdown-container\" data-v-191eb8d1=\"\" data-v-5d235d8f=\"\">\n<div class=\"markdown\" data-v-53cd9be5=\"\" data-v-191eb8d1=\"\">\n<p class=\"paragraph\"><strong>Timeline:<\/strong><\/p>\n<ul>\n<li>\n<p class=\"paragraph\">January 15, 2025, 02:25: Vulnerability disclosure.<\/p>\n<\/li>\n<li>\n<p class=\"paragraph\">January 15, 2025, 02:25: Upstream patch release, rsync 3.4.0 version released, including vulnerability fixes.<\/p>\n<\/li>\n<li>\n<p class=\"paragraph\">January 15, 2025, 02:45: deepin sysdev group syncs upstream update.<\/p>\n<\/li>\n<li>\n<p class=\"paragraph\">January 15, 2025, 10:11: Update pushed to deepin 23 and deepin 25 users.<\/p>\n<\/li>\n<\/ul>\n<p class=\"paragraph\"><strong>References:<\/strong><\/p>\n<ul>\n<li>\n<p class=\"paragraph\">oss-security announcement: <a class=\"\" href=\"https:\/\/www.openwall.com\/lists\/oss-security\/2025\/01\/14\/3\" target=\"_blank\" rel=\"noreferrer nofollow noopener\" data-v-191eb8d1=\"\">security - RSYNC: 6 vulnerabilities<\/a><\/p>\n<\/li>\n<li>\n<p class=\"paragraph\">CERT KB: <a class=\"\" href=\"https:\/\/kb.cert.org\/vuls\/id\/952657\" target=\"_blank\" rel=\"noreferrer nofollow noopener\" data-v-191eb8d1=\"\">CERT\/CC Vulnerability Note VU#952657<\/a><\/p>\n<\/li>\n<\/ul>\n<p class=\"paragraph\"><strong>We strongly recommend all rsync users update to version 3.4.0 (deepin version 3.3.0+ds1-3) as soon as possible to address the aforementioned security vulnerabilities.<\/strong><\/p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&gt;&gt; <a href=\"https:\/\/distrowatch.com\/table.php?distribution=deepin\">Click to support the deepin Community<\/a>","protected":false},"excerpt":{"rendered":"<p>At 02:25 Beijing time on January 15, 2025, security researcher Nick Tait reported six security vulnerabilities in rsync on the oss-security mailing list. Among them, the most severe vulnerability allows attackers to execute arbitrary code on the server simply by having anonymous read access to the rsync server (such as a public mirror). Vulnerability Details: CVE-2024-12084 (CVSS: 9.8): There is a heap buffer overflow vulnerability in rsync due to improper handling of checksum lengths. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), attackers can perform out-of-bounds writes in the sum2 buffer. Affected versions: 3.2.7 to 3.4.0. CVE-2024-12085 (CVSS: 7.5): In ...<a href=https:\/\/www.deepin.org.cn\/en\/rsync-vulnerability-announcement\/>Read more<\/a><\/p>\n","protected":false},"author":11164,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[213],"tags":[],"_links":{"self":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/36023"}],"collection":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/users\/11164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/comments?post=36023"}],"version-history":[{"count":8,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/36023\/revisions"}],"predecessor-version":[{"id":36053,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/36023\/revisions\/36053"}],"wp:attachment":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/media?parent=36023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/categories?post=36023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/tags?post=36023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}