First published: Wed Dec 18 2024(Updated: )
This vulnerability stems from a race condition in rsync's handling of symbolic links. By exploiting timing differences, an attacker can bypass the expected behavior of skipping symbolic links during file synchronization. This flaw becomes critical in scenarios where rsync runs with elevated privileges, as it can inadvertently expose sensitive files to unprivileged users, potentially leading to privilege escalation.
Affected Software | Affected Version | How to fix |
---|---|---|
Samba |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2332968 is critical due to the potential for elevated privilege escalation.
To fix REDHAT-BUG-2332968, update to the latest version of rsync provided by the vendor that addresses the race condition.
Samba rsync is the software primarily affected by REDHAT-BUG-2332968.
The main issue caused by REDHAT-BUG-2332968 is a race condition that allows attackers to bypass symbolic link protections during file synchronization.
Users running Samba rsync with elevated privileges are at risk from REDHAT-BUG-2332968 as the vulnerability may lead to unauthorized access.