SHARE
Facebook X Pinterest WhatsApp

Rsync Vulnerabilities Allow Remote Code Execution on Servers, Patch Quickly!

Written By
JP
James Patterson
Jan 20, 2025

Six vulnerabilities have been fixed in the newest versions of Rsync (v3.4.0), two of which could be exploited by a malicious client to achieve arbitrary code execution on a machine with a running Rsync server.

“The client requires only anonymous read-access to the server, such as public mirrors. Additionally, attackers can take control of a malicious server and read/write arbitrary files of any connected client. Sensitive data, such as SSH keys, can be extracted, and malicious code can be executed by overwriting files such as ~/.bashrc or ~/.popt,” CERT/CC noted.

JP

James Patterson

Recommended for you...

DavMail 6.5 Exchange Gateway Brings Interactive Office 365 Login
Bobby Borisov
Nov 7, 2025
Bottles 51.25 Released With st Terminal Support
Bobby Borisov
Nov 7, 2025
Arch Linux Users Are the First to Experience KDE Plasma 6.5
Bobby Borisov
Nov 7, 2025
13 Useful Free and Open Source DNS Tools
webmaster
Nov 7, 2025
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.