CVE-2024-12084
15.01.2025, 15:15
A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.Enginsight
Vendor | Product | Version |
---|---|---|
samba | rsync | 3.2.7 |
samba | rsync | 3.3.0 |
almalinux | almalinux | 10.0 |
archlinux | arch_linux | - |
gentoo | linux | - |
nixos | nixos | 𝑥 < 24.11 |
nixos | nixos | 24.11 |
novell | suse_linux | - |
tritondatacenter | smartos | 𝑥 < 20250123 |
redhat | enterprise_linux | 10.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-122 - Heap-based Buffer OverflowA heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.
References