Ancestors

Toot

Written by Jan Schaumann on 2025-01-14 at 18:26

6 new CVEs in "rsync".

"In the most severe CVE, an attacker only requires anonymous read access to a rsync server, such as a public mirror, to execute arbitrary code on the machine the server is running on."

That would be CVE-2024-12084 (9.8) AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, a heap-based buffer overflow in rsyncd.

https://www.openwall.com/lists/oss-security/2025/01/14/3

=> More informations about this toot | More toots from jschauma@mstdn.social

Descendants

Written by Jan Schaumann on 2025-01-14 at 19:45

Anybody know whether the issue in CVE-2024-12084 is strictly within "rsyncd", or does this also affect "rsync --server --sender"?

If so, then that would impact a lot more deployments, i.e., those that depend on SSH as the transport.

=> More informations about this toot | More toots from jschauma@mstdn.social

Written by Parade du Grotesque πŸ’€ on 2025-01-14 at 18:35

@jschauma

Ouch!

=> More informations about this toot | More toots from ParadeGrotesque@mastodon.sdf.org

Written by bert hubert πŸ‡ΊπŸ‡¦πŸ‡ͺπŸ‡Ί on 2025-01-14 at 18:48

@jschauma I spent good time investigating if I should enable an anonymous rsync server for a DNA project and on balance I decided it felt too risky. Really sucks that there is almost nothing left we can trust.

=> More informations about this toot | More toots from bert_hubert@fosstodon.org

Written by Fazal Majid on 2025-01-14 at 19:33

@bert_hubert @jschauma have you looked at Unison? It uses the rsync algorithm but it is bidrectional. Regarding security, it's as secure as SSH (as is using rsync in SSH mode).

I do have at least one device (UnifyDrive UT2) that uses rsyncd for software updates. Well, perhaps here is my opportunity to root its locked-down OS after all πŸ™‚

=> More informations about this toot | More toots from fazalmajid@vivaldi.net

Written by John Kristoff on 2025-01-14 at 18:57

@jschauma The thing I'd be especially concerned about are #RPKI publication points.

=> More informations about this toot | More toots from jtk@infosec.exchange

Written by Claus Holm Christensen on 2025-01-14 at 22:28

@jschauma I do not know if rsync --server is also affected, but if the transport is SSH, then the remote end is rarely unknown?

It is a reduced attack surface (only known users allowed to use SSH), and you have a better chance of identifying a hacker from the log files.

=> More informations about this toot | More toots from claushc@mastodon.social

Written by sebsauvage on 2025-01-14 at 19:55

@jschauma 😱

=> More informations about this toot | More toots from sebsauvage@framapiaf.org

Written by SpaceLifeForm on 2025-01-14 at 20:11

@jschauma

Nasty. Clever.

=> More informations about this toot | More toots from SpaceLifeForm@infosec.exchange

Written by David W. Jones on 2025-01-15 at 01:20

@jschauma

Esplains today's security updates to rsync in Debian Bookworm!

@SpaceLifeForm

=> More informations about this toot | More toots from dancingtreefrog@mastodon.social

Proxy Information
Original URL
gemini://mastogem.picasoft.net/thread/113828113273500577
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
296.222983 milliseconds
Gemini-to-HTML Time
1.536749 milliseconds

This content has been proxied by September (ba2dc).