This vulnerability stems from a race condition in rsync's handling of symbolic links. By exploiting timing differences, an attacker can bypass the expected behavior of skipping symbolic links during file synchronization. This flaw becomes critical in scenarios where rsync runs with elevated privileges, as it can inadvertently expose sensitive files to unprivileged users, potentially leading to privilege escalation.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:2600 https://access.redhat.com/errata/RHSA-2025:2600