6 new CVEs in "rsync".
"In the most severe CVE, an attacker only requires anonymous read access to a rsync server, such as a public mirror, to execute arbitrary code on the machine the server is running on."
That would be CVE-2024-12084 (9.8) AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, a heap-based buffer overflow in rsyncd.
https://www.openwall.com/lists/oss-security/2025/01/14/3
=> More informations about this toot | More toots from jschauma@mstdn.social
@jschauma I spent good time investigating if I should enable an anonymous rsync server for a DNA project and on balance I decided it felt too risky. Really sucks that there is almost nothing left we can trust.
=> More informations about this toot | More toots from bert_hubert@fosstodon.org
@bert_hubert @jschauma have you looked at Unison? It uses the rsync algorithm but it is bidrectional. Regarding security, it's as secure as SSH (as is using rsync in SSH mode).
I do have at least one device (UnifyDrive UT2) that uses rsyncd for software updates. Well, perhaps here is my opportunity to root its locked-down OS after all π
=> More informations about this toot | More toots from fazalmajid@vivaldi.net
text/gemini
This content has been proxied by September (3851b).