Detection
Monitor command-line arguments for rsync processes. Alert on execution of rsync with -X or --xattrs flags on affected versions.
The vulnerability exists in receive_xattr where an untrusted length value is utilized during a qsort operation. This leads to a receiver use-after-free scenario. The issue is classified as CWE-130: Improper Handling of Length Parameter Inconsistency. The vulnerability specifically impacts configurations where extended attributes are enabled, which is a common setup in many Linux environments.
-X or --xattrs flag in system automation or manual user scripts.Forensic analysis should focus on identifying rsync execution patterns.
-X or --xattrs.Detection
Monitor command-line arguments for rsync processes. Alert on execution of rsync with -X or --xattrs flags on affected versions.
Mitigation
Update rsync to a patched version beyond 3.4.1. If patching is not immediately feasible, disable the use of extended attributes (-X / --xattrs) in rsync configurations.