Metrics
Affected Vendors & Products
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Mon, 03 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Tue, 08 Jul 2025 04:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:10.0 | |
| References | 
         | 
Wed, 18 Jun 2025 16:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Almalinux
         Almalinux almalinux Archlinux Archlinux arch Linux Gentoo Gentoo linux Nixos Nixos nixos Novell Novell suse Linux Samba Samba rsync Tritondatacenter Tritondatacenter smartos  | 
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:samba:rsync:3.2.7:-:*:*:*:*:*:* cpe:2.3:a:samba:rsync:3.3.0:-:*:*:*:*:*:* cpe:2.3:o:almalinux:almalinux:10.0:-:*:*:*:*:*:* cpe:2.3:o:archlinux:arch_linux:-:*:*:*:*:*:*:* cpe:2.3:o:gentoo:linux:-:*:*:*:*:*:*:* cpe:2.3:o:nixos:nixos:*:*:*:*:*:*:*:* cpe:2.3:o:nixos:nixos:24.11:*:*:*:*:*:*:* cpe:2.3:o:novell:suse_linux:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:tritondatacenter:smartos:*:*:*:*:*:*:*:*  | 
|
| Vendors & Products | 
        
        Almalinux
         Almalinux almalinux Archlinux Archlinux arch Linux Gentoo Gentoo linux Nixos Nixos nixos Novell Novell suse Linux Samba Samba rsync Tritondatacenter Tritondatacenter smartos  | 
Thu, 22 May 2025 12:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        ssvc
         
  | 
    
        
        
        ssvc
         
  | 
Thu, 22 May 2025 11:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:10 | 
Wed, 26 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Wed, 15 Jan 2025 15:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Wed, 15 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Wed, 15 Jan 2025 14:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Title | rsync: Heap Buffer Overflow in Rsync due to Improper Checksum Length Handling | Rsync: heap buffer overflow in rsync due to improper checksum length handling | 
| First Time appeared | 
        
        Redhat
         Redhat enterprise Linux Redhat openshift  | 
|
| CPEs | cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9  | 
|
| Vendors & Products | 
        
        Redhat
         Redhat enterprise Linux Redhat openshift  | 
|
| References | 
         | 
Wed, 15 Jan 2025 02:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer. | |
| Title | rsync: Heap Buffer Overflow in Rsync due to Improper Checksum Length Handling | |
| Weaknesses | CWE-122 | |
| References | 
         | |
| Metrics | 
        
        
        threat_severity
         
  | 
    
        
        cvssV3_1
         
 
  | 
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-03T21:52:08.021Z
Reserved: 2024-12-03T08:57:42.580Z
Link: CVE-2024-12084
Updated: 2025-11-03T21:52:08.021Z
Status : Modified
Published: 2025-01-15T15:15:10.537
Modified: 2025-11-03T22:16:38.910
Link: CVE-2024-12084