January 2025 – Multiple rsync CVEs impacting memory and file handling in Linux virtual images

The latest versions of HAProxy Fusion fix multiple rsync vulnerabilities related to memory handling and file management in HAProxy Fusion’s Linux-based virtual images. Specifically, attackers can take advantage of weaknesses in rsync checksum mechanisms and symbolic link verification processes. 

These five CVEs only affect components within HAProxy Fusion binaries. We'll cover each in greater detail before sharing remediation steps. 

If you are using HAProxy Fusion virtual images, you should upgrade to the fixed version as soon as possible. There are no workarounds available.

If you are using HAProxy Fusion installation packages, you should upgrade your rsync packages to the latest version following the usual procedure for your operating system.

High-impact CVEs

CVE-2024-12085

This CVE exposes a flaw within the rsync daemon which could be triggered when rsync compares file checksums. This allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory, and leak one byte of uninitialized stack data at a time.

This impacts all rsync versions.

CVE-2024-12086

This CVE exposes a flaw within rsync that could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs as files are copied from client to server. During this process, the rsync server will send checksums of local data to the client for comparison to determine what data needs to be sent back. By sending carefully constructed checksum values for arbitrary files, an attacker may be able to reconstruct file data byte-by-byte based on responses from the client.

This impacts all rsync versions.

CVE-2024-12087

This CVE exposes a path traversal vulnerability within rsync stemming from behavior enabled by the --inc-recursive option. This is enabled by default for many client options and can be enabled by the server even if not explicitly enabled by the client. 

When using the --inc-recursive option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid client directories and paths.

This impacts all rsync versions.

CVE-2024-12088

This CVE exposes a verification flaw within rsync. When using the --safe-links option, rsync fails to properly verify if a symbolic link destination contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the intended directory.

This impacts all rsync versions.

CVE-2024-12747

This CVE exposes a flaw within rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. By default, rsync skips symbolic links upon encountering them. If an attacker replaces a regular file with a symbolic link at a precise time, it is possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information — potentially leading to privilege escalation.

This impacts all rsync versions.

Affected versions and remediation

HAProxy Technologies released new versions of HAProxy Fusion virtual images on Tuesday, 21 January 2025. You can identify the fixed versions by the release date 20250121 or later.

These releases patch the vulnerability described in CVE-2024-12085, CVE-2024-12086, CVE-2024-12087, CVE-2024-12088, and CVE-2024-12747 (CVSSv3 scores ranging from 5.6 to 7.5). 

Users should immediately upgrade to these fixed HAProxy Fusion virtual images by following our HAProxy Fusion upgrade instructions.

Support

If you are a customer and have questions about upgrading to the latest version, please get in touch with the HAProxy support team.

Subscribe to our blog. Get the latest release updates, tutorials, and deep-dives from HAProxy experts.