144 points by pavodive 3 days ago | 22 comments
concerndc1tizen 3 days ago
mhw 3 days ago
I guess the main takeaway is to be careful using rsync connections to machines that you don't trust.
crest 3 days ago
formerly_proven 3 days ago
bell-cot 3 days ago
Which (in my paranoid opinion) is pretty much the only secure use case anyway, for code like rsync.
kees99 3 days ago
Not quite. If server has "command=rsync ..." in ~/.ssh/authorized_keys file, for some ssh key (to allow rsync access, but deny shell access), this vulnerability will allow attacker in possession of that ssh key to go around that restriction, and get shell nonetheless.
nrdvana 3 days ago
If I was running an rsync daemon facing the public, it would be in a chroot with dropped privileges.
jmclnx 3 days ago
But I wonder of OpenBSD's openrsync has the same issue ? Or did that version avoid the issues when it was created ?
If it was avoided, seems OpenBSD was ahead of the curve again.
somat 3 days ago
ducktective 3 days ago
rsync (3.2.7-1+deb12u1) bookworm-security; urgency=high
cf100clunk 3 days ago
crest 3 days ago
snvzz 2 days ago
chasil 3 days ago
There are (now) two rsync codebases.
crest 3 days ago
samueloph 3 days ago
It impacts those who need to use `-r` (recursive) together with `-H` (preserve hardlinks),
SOLAR_FIELDS 3 days ago
samueloph 2 days ago