CVE-2024-12084

A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:samba:rsync:3.2.7:-:*:*:*:*:*:*
cpe:2.3:a:samba:rsync:3.3.0:-:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:almalinux:almalinux:10.0:-:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:archlinux:arch_linux:-:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:gentoo:linux:-:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:nixos:nixos:*:*:*:*:*:*:*:*
cpe:2.3:o:nixos:nixos:24.11:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:o:novell:suse_linux:-:*:*:*:*:*:*:*

Configuration 7 (hide)

cpe:2.3:o:tritondatacenter:smartos:*:*:*:*:*:*:*:*

Configuration 8 (hide)

cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

History

08 Jul 2025, 04:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHBA-2025:6470 -

18 Jun 2025, 16:25

Type Values Removed Values Added
First Time Nixos nixos
Tritondatacenter smartos
Gentoo linux
Novell
Almalinux
Almalinux almalinux
Samba rsync
Redhat enterprise Linux
Nixos
Gentoo
Archlinux arch Linux
Novell suse Linux
Archlinux
Samba
Redhat
Tritondatacenter
CWE CWE-787
References () https://access.redhat.com/security/cve/CVE-2024-12084 - () https://access.redhat.com/security/cve/CVE-2024-12084 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2330527 - () https://bugzilla.redhat.com/show_bug.cgi?id=2330527 - Issue Tracking, Third Party Advisory
References () https://kb.cert.org/vuls/id/952657 - () https://kb.cert.org/vuls/id/952657 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2025/01/14/6 - () http://www.openwall.com/lists/oss-security/2025/01/14/6 - Mailing List, Third Party Advisory
References () https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-mvqj - () https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-mvqj - Exploit, Vendor Advisory
CPE cpe:2.3:o:gentoo:linux:-:*:*:*:*:*:*:*
cpe:2.3:a:samba:rsync:3.3.0:-:*:*:*:*:*:*
cpe:2.3:o:archlinux:arch_linux:-:*:*:*:*:*:*:*
cpe:2.3:o:almalinux:almalinux:10.0:-:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux:-:*:*:*:*:*:*:*
cpe:2.3:o:tritondatacenter:smartos:*:*:*:*:*:*:*:*
cpe:2.3:a:samba:rsync:3.2.7:-:*:*:*:*:*:*
cpe:2.3:o:nixos:nixos:*:*:*:*:*:*:*:*
cpe:2.3:o:nixos:nixos:24.11:*:*:*:*:*:*:*

26 Feb 2025, 14:15

Type Values Removed Values Added
References
  • () https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-mvqj -
Summary
  • (es) Se encontró un fallo de desbordamiento de búfer basado en montón en rsync daemon. Este problema se debe a una gestión inadecuada de las longitudes de suma de comprobación controladas por el atacante (s2length) en el código. Cuando MAX_DIGEST_LEN excede el valor fijo SUM_LENGTH (16 bytes), un atacante puede escribir fuera de los límites en el búfer de sum2.

15 Jan 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-15 15:15

Updated : 2025-07-08 04:15


NVD link : CVE-2024-12084

Mitre link : CVE-2024-12084

CVE.ORG link : CVE-2024-12084


JSON object : View

Products Affected

nixos

  • nixos

archlinux

  • arch_linux

almalinux

  • almalinux

samba

  • rsync

tritondatacenter

  • smartos

novell

  • suse_linux

redhat

  • enterprise_linux

gentoo

  • linux
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write