First published: Wed Dec 18 2024(Updated: )
A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/rsync | <=3.2.3-4+deb11u1<=3.2.7-1 | 3.2.3-4+deb11u3 3.2.7-1+deb12u2 3.3.0+ds1-4 |
F5 BIG-IP and BIG-IQ Centralized Management |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-12747 is considered a high-severity vulnerability due to its potential exploitation through a race condition in rsync.
To fix CVE-2024-12747, upgrade rsync to version 3.2.3-4+deb11u3, 3.2.7-1+deb12u2, or 3.3.0+ds1-4.
Rsync versions up to and including 3.2.3-4+deb11u1 and 3.2.7-1 are affected by CVE-2024-12747.
CVE-2024-12747 is a race condition vulnerability occurring during the handling of symbolic links in rsync.
Yes, CVE-2024-12747 can be exploited remotely if an attacker can replace a regular file with a symbolic link during rsync operations.