A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.
History

Wed, 15 Jan 2025 02:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 14 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
References

Tue, 14 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Jan 2025 17:45:00 +0000

Type Values Removed Values Added
Description A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.
Title Rsync: race condition in rsync handling symbolic links
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
Weaknesses CWE-362
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References
Metrics cvssV3_1

{'score': 5.6, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2025-01-14T17:39:16.031Z

Updated: 2025-01-14T21:55:24.412Z

Reserved: 2024-12-18T06:49:21.481Z

Link: CVE-2024-12747

cve-icon Vulnrichment

Updated: 2025-01-14T18:38:14.932Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-14T18:15:25.830

Modified: 2025-01-14T22:15:26.700

Link: CVE-2024-12747

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-01-14T15:06:00Z

Links: CVE-2024-12747 - Bugzilla