CVE-2024-12087

NameCVE-2024-12087
DescriptionA path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-4015-1, DSA-5843-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rsync (PTS)bullseye3.2.3-4+deb11u1vulnerable
bullseye (security)3.2.3-4+deb11u2fixed
bookworm3.2.7-1vulnerable
bookworm (security)3.2.7-1+deb12u1fixed
trixie3.3.0+ds1-2vulnerable
sid3.3.0+ds1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rsyncsourcebullseye3.2.3-4+deb11u2DLA-4015-1
rsyncsourcebookworm3.2.7-1+deb12u1DSA-5843-1
rsyncsource(unstable)3.3.0+ds1-3

Notes

https://www.openwall.com/lists/oss-security/2025/01/14/3
Fixed by: https://git.samba.org/?p=rsync.git;a=commit;h=688f5c379a433038bde36897a156d589be373a98 (v3.4.0)
Fixed by: https://git.samba.org/?p=rsync.git;a=commit;h=344327385fa47fa5bb67a32c237735e6240cfb93 (v3.4.0)

Search for package or bug name: Reporting problems