Debian dla-4015 : rsync - security update

high Nessus Plugin ID 214147

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 11 host has a package installed that is affected by multiple vulnerabilities as referenced in the dla-4015 advisory.

- ------------------------------------------------------------------------- Debian LTS Advisory DLA-4015-1 [email protected] https://www.debian.org/lts/security/ Thorsten Alteholz January 14, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : rsync Version : 3.2.3-4+deb11u2 CVE ID : CVE-2024-12085 CVE-2024-12086 CVE-2024-12087 CVE-2024-12088 CVE-2024-12747


Several vulnerabilities were discovered in rsync, a fast, versatile, remote (and local) file-copying tool.

CVE-2024-12085

Simon Scannell, Pedro Gallegos and Jasiel Spelman reported a flaw in the way rsync compares file checksums, allowing a remote attacker to trigger an information leak.

CVE-2024-12086

Simon Scannell, Pedro Gallegos and Jasiel Spelman discovered a flaw which would result in a server leaking contents of an arbitrary file from the client's machine.

CVE-2024-12087

Simon Scannell, Pedro Gallegos and Jasiel Spelman reported a path traversal vulnerability in the rsync daemon affecting the
--inc-recursive option, which could allow a server to write files outside of the client's intended destination directory.

CVE-2024-12088

Simon Scannell, Pedro Gallegos and Jasiel Spelman reported that when using the --safe-links option, rsync fails to properly verify if a symbolic link destination contains another symbolic link with it, resulting in path traversal and arbitrary file write outside of the desired directory.

CVE-2024-12747

Aleksei Gorban loqpa discovered a race condition when handling symbolic links resulting in an information leak which may enable escalation of privileges.


For Debian 11 bullseye, these problems have been fixed in version 3.2.3-4+deb11u2.

We recommend that you upgrade your rsync packages.

For the detailed security status of rsync please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/rsync

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the rsync packages.

See Also

https://security-tracker.debian.org/tracker/source-package/rsync

https://security-tracker.debian.org/tracker/CVE-2024-12085

https://security-tracker.debian.org/tracker/CVE-2024-12086

https://security-tracker.debian.org/tracker/CVE-2024-12087

https://security-tracker.debian.org/tracker/CVE-2024-12088

https://security-tracker.debian.org/tracker/CVE-2024-12747

https://packages.debian.org/source/bullseye/rsync

Plugin Details

Severity: High

ID: 214147

File Name: debian_DLA-4015.nasl

Version: 1.1

Type: local

Agent: unix

Published: 1/14/2025

Updated: 1/14/2025

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:C/A:C

CVSS Score Source: CVE-2024-12747

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2024-12085

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:rsync

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 1/14/2025

Vulnerability Publication Date: 1/11/2025

Reference Information

CVE: CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747