Security update for rsync
| Announcement ID: | SUSE-SU-2025:20223-1 |
|---|---|
| Release Date: | 2025-02-07T09:57:24Z |
| Rating: | critical |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves six vulnerabilities can now be installed.
Description:
This update for rsync fixes the following issues:
-
Bump protocol version to 32 - make it easier to show server is patched.
-
Fix FLAG_GOT_DIR_FLIST collission with FLAG_HLINKED
-
Security update,CVE-2024-12747, bsc#1235475 race condition in handling symbolic links
-
Security update, fix multiple vulnerabilities:
- CVE-2024-12084, bsc#1234100 - Heap Buffer Overflow in Checksum Parsing
- CVE-2024-12085, bsc#1234101 - Info Leak via uninitialized Stack contents defeats ASLR
- CVE-2024-12086, bsc#1234102 - Server leaks arbitrary client files
- CVE-2024-12087, bsc#1234103 - Server can make client write files outside of destination directory using symbolic links
- CVE-2024-12088, bsc#1234104 - --safe-links Bypass
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Micro 6.1
zypper in -t patch SUSE-SLE-Micro-6.1-15=1
Package List:
-
SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64)
- rsync-3.3.0-slfo.1.1_3.1
- rsync-debuginfo-3.3.0-slfo.1.1_3.1
- rsync-debugsource-3.3.0-slfo.1.1_3.1
References:
- https://www.suse.com/security/cve/CVE-2024-12084.html
- https://www.suse.com/security/cve/CVE-2024-12085.html
- https://www.suse.com/security/cve/CVE-2024-12086.html
- https://www.suse.com/security/cve/CVE-2024-12087.html
- https://www.suse.com/security/cve/CVE-2024-12088.html
- https://www.suse.com/security/cve/CVE-2024-12747.html
- https://bugzilla.suse.com/show_bug.cgi?id=1234100
- https://bugzilla.suse.com/show_bug.cgi?id=1234101
- https://bugzilla.suse.com/show_bug.cgi?id=1234102
- https://bugzilla.suse.com/show_bug.cgi?id=1234103
- https://bugzilla.suse.com/show_bug.cgi?id=1234104
- https://bugzilla.suse.com/show_bug.cgi?id=1235475