Skip to content

Conversation

@tridge
Copy link
Member

@tridge tridge commented Jan 14, 2025

This prepares for the release of 3.4.0, which is a security release coordinated with CERT and VINCE
See https://kb.cert.org/vuls/id/952657

tridge and others added 12 commits January 15, 2025 05:20
prevent leak of uninitialised stack data in hash_search
this prevents a malicious server providing a file to compare to when
the user has not given the fuzzy option
this is an open that enforces no symlink following for all path
components in a relative path
this prevents attacks where the basis file is manipulated by a
malicious sender to gain information about files outside the
destination tree
when --safe-links is used also reject links where a '../' component is
included in the destination as other than the leading part of the
filename
when we open a file that we don't expect to be a symlink use
O_NOFOLLOW to prevent a race condition where an attacker could change
a file between being a normal file and a symlink
make it easier to spot unpatched servers
@tridge tridge merged commit 870b7d9 into master Jan 14, 2025
4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants