alt.hn

1/15/2025 at 2:45:54 AM

Rsync vulnerabilities

https://www.openwall.com/lists/oss-security/2025/01/14/3

by pavodive

1/15/2025 at 1:50:19 PM

Do I read correctly that this is related to "rsync daemon" (rsyncd), and therefore has minimal impact on people who just use rsync over ssh?

by concerndc1tizen

1/15/2025 at 2:10:22 PM

My reading is that the first two CVEs are with rsync daemon, but the others are more general - I think "rsync server" is meaning the remote rsync process that is started when you use ssh to connect to the remote. Some of them suggest the rsync client (running on your machine) can be coerced to write to unexpected locations by a malicious rsync server specifically crafted to exploit these CVEs. One suggests a malicious rsync server might be able to reconstruct the contents of arbitrary files on the client using requests sent via the rsync protocol.

I guess the main takeaway is to be careful using rsync connections to machines that you don't trust.

by mhw

1/15/2025 at 5:36:26 PM

It's the same protocol and code implementing it just proxied over SSH instead of a local pipe or unix socket pair. It's a real world issue unless you trust the remote rsync process and the connection with your local user. So basically only SSH between your single-user desktop and same single-user laptop is unimpacted.

by crest

1/15/2025 at 2:24:56 PM

Every rsync operation (even locally) involves an rsync client and a separate rsync server process.

by formerly_proven

1/15/2025 at 2:06:32 PM

My read (not an expert) is that you are safe if your rsync is only via secure connections, to & from systems where untrusted parties can neither run rsync, nor play clever games with the files which rsync is accessing.

Which (in my paranoid opinion) is pretty much the only secure use case anyway, for code like rsync.

by bell-cot

1/15/2025 at 6:46:42 PM

> you are safe if your rsync is only via secure connections

Not quite. If server has "command=rsync ..." in ~/.ssh/authorized_keys file, for some ssh key (to allow rsync access, but deny shell access), this vulnerability will allow attacker in possession of that ssh key to go around that restriction, and get shell nonetheless.

by kees99

1/15/2025 at 7:18:27 PM

He said where untrusted parties aren't able to run rsync.

If I was running an rsync daemon facing the public, it would be in a chroot with dropped privileges.

by nrdvana

1/15/2025 at 1:59:16 PM

[dead]

by throwaway984393

1/16/2025 at 3:57:03 AM

[dead]

by aaron695

1/15/2025 at 1:18:55 PM

Slackware sent a fixed version of rsync out yesterday.

But I wonder of OpenBSD's openrsync has the same issue ? Or did that version avoid the issues when it was created ?

If it was avoided, seems OpenBSD was ahead of the curve again.

by jmclnx

1/15/2025 at 8:35:29 PM

openrsync is a neat story, it was made because they wanted to use rsync in the rpki system, but the standards body balked, saying they should not be using something where the standard was the implementation, so the openbsd folk(specifically Kristaps Dzonsons) stepped up and made a second rsync implementation so that the standards body could accept the protocol.

http://man.openbsd.org/rpki-client

by somat

1/15/2025 at 6:42:00 PM

Debian issued a security update too:

  rsync (3.2.7-1+deb12u1) bookworm-security; urgency=high

by ducktective

1/15/2025 at 5:05:34 PM

I'm running several Linux distros and package updates to rsync version 3.2.7 have showed up on all of them already. I can't comment on openrsync.

by cf100clunk

1/15/2025 at 5:40:52 PM

Given the more permissive license openrsync would be in a pickle if they stole the vulnerable GPL code and claimed to redistribute it under BSD license instead of reimplementing the protocol.

by crest

1/16/2025 at 3:39:02 AM

Which is highly unlikely to happen in openbsd.

by snvzz

1/15/2025 at 4:05:02 PM

Does this apply to the GPL or BSD codebase?

There are (now) two rsync codebases.

GPL: https://rsync.samba.org/

BSD: https://www.openrsync.org/

by chasil

1/15/2025 at 5:38:42 PM

It applies to only to rsync and to not the (Open)BSD rewrite openrsync. openrsync intentionally doesn't reimplement all features so it's not always a drop in replacement.

by crest

1/15/2025 at 6:19:24 PM

There's a serious regression in the fixes: https://github.com/RsyncProject/rsync/issues/702

It impacts those who need to use `-r` (recursive) together with `-H` (preserve hardlinks),

by samueloph

1/15/2025 at 8:45:19 PM

Fix was merged an hour ago, roughly an hour after you made this comment (at which time they were still working on it)

by SOLAR_FIELDS

1/15/2025 at 9:39:17 PM

Are these applicable to the openrsync project?

by ThatGuyRaion

1/16/2025 at 3:37:28 AM

Openbsd do unsurprisingly have higher standards for code quality.

by snvzz

1/15/2025 at 10:05:24 PM

> Anonymous read access to a rsync server... such as on a public mirror

I did not know people did that.

by captainbland