EGI SVG Advisories

Advisory-EGI-SVG-2025-01

Up to CRITICAL Vulnerabilities in rsync

Date: 2025-01-16
Updated: 2025-03-20

6 new vulnerabilities concerning rsync, of which the highest risk rating is CRITICAL (not for RHEL 8/9), have been patched in the latest release of rsync.

IDs AND CVSS SCORE

EGI SVG ID : EGI-SVG-2025-01

CVE ID : CVE-2024-12084, CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, CVE-2024-12747

CVSS Score : Up to 9.8 [R 1]/[R 2]

AFFECTED SOFTWARE AND VERSIONS

Affected versions:

ACTIONS REQUIRED/RECOMMENDED

Sites running vulnerable versions of rsync are required to urgently upgrade.

All running resources MUST be either patched or have mitigation in place or software removed by 2025-01-24 00:00 UTC.

Sites failing to act and/or failing to respond to requests from the EGI CSIRT team risk site suspension.

COMPONENT INSTALLATION INFORMATION

Sites should update the relevant components using the RedHat or other vendor sources.

See references below for further information.

MORE INFORMATION

A list of CVE IDs and CVSS scores:

For a full list of vulnerabilities with their descriptions, affected versions and mitigations, please see [R 1].

[R 3] Contains a handy table to determine if your platform and version is affected. We recommend reffering to this page to determine if you are affected.

STATUS OF THIS ADVISORY

TLP:CLEAR information - Unlimited distribution

https://advisories.egi.eu/Advisory-EGI-SVG-2025-01

https://advisories.egi.eu/Advisory-SVG-CVE-2024-12084

Minor updates may be made without re-distribution to the sites.

CONTACT AND OTHER INFORMATION ON SVG


This advisory is subject to the Creative Commons licence 
https://creativecommons.org/licenses/by/4.0/ and
the EGI (https://www.egi.eu/) Software Vulnerability Group 
must be credited. -

Vulnerabilities relevant for EGI can be reported at report-vulnerability at egi.eu

(see [R 99] for further details, and other information on SVG)

REFERENCES

Red Hat advisories:

Links to notes concerning the critical CVE:

Other:

CREDITS

SVG was alerted to this vulnerability by Barbara KraĊĦovec.