A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
History

Wed, 18 Jun 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Almalinux
Almalinux almalinux
Archlinux
Archlinux arch Linux
Gentoo
Gentoo linux
Nixos
Nixos nixos
Novell
Novell suse Linux
Samba
Samba rsync
Tritondatacenter
Tritondatacenter smartos
Weaknesses CWE-787
CPEs cpe:2.3:a:samba:rsync:3.2.7:-:*:*:*:*:*:*
cpe:2.3:a:samba:rsync:3.3.0:-:*:*:*:*:*:*
cpe:2.3:o:almalinux:almalinux:10.0:-:*:*:*:*:*:*
cpe:2.3:o:archlinux:arch_linux:-:*:*:*:*:*:*:*
cpe:2.3:o:gentoo:linux:-:*:*:*:*:*:*:*
cpe:2.3:o:nixos:nixos:*:*:*:*:*:*:*:*
cpe:2.3:o:nixos:nixos:24.11:*:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:tritondatacenter:smartos:*:*:*:*:*:*:*:*
Vendors & Products Almalinux
Almalinux almalinux
Archlinux
Archlinux arch Linux
Gentoo
Gentoo linux
Nixos
Nixos nixos
Novell
Novell suse Linux
Samba
Samba rsync
Tritondatacenter
Tritondatacenter smartos

Thu, 22 May 2025 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 22 May 2025 11:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10

Wed, 26 Feb 2025 18:15:00 +0000


Wed, 15 Jan 2025 15:30:00 +0000

Type Values Removed Values Added
References

Wed, 15 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Jan 2025 14:30:00 +0000

Type Values Removed Values Added
Title rsync: Heap Buffer Overflow in Rsync due to Improper Checksum Length Handling Rsync: heap buffer overflow in rsync due to improper checksum length handling
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References

Wed, 15 Jan 2025 02:00:00 +0000

Type Values Removed Values Added
Description A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
Title rsync: Heap Buffer Overflow in Rsync due to Improper Checksum Length Handling
Weaknesses CWE-122
References
Metrics threat_severity

None

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Critical


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-05-22T11:20:16.196Z

Reserved: 2024-12-03T08:57:42.580Z

Link: CVE-2024-12084

cve-icon Vulnrichment

Updated: 2025-01-15T15:02:44.467Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-15T15:15:10.537

Modified: 2025-06-18T16:25:59.640

Link: CVE-2024-12084

cve-icon Redhat

Severity : Critical

Publid Date: 2025-01-14T15:06:00Z

Links: CVE-2024-12084 - Bugzilla