A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2024-12086 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2330577 | Issue Tracking Third Party Advisory |
https://kb.cert.org/vuls/id/952657 | Third Party Advisory |
https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-mvqj | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
20 Jun 2025, 18:40
Type | Values Removed | Values Added |
---|---|---|
First Time |
Nixos nixos
Suse suse Linux Tritondatacenter smartos Gentoo linux Almalinux Almalinux almalinux Samba rsync Redhat enterprise Linux Nixos Gentoo Archlinux arch Linux Redhat openshift Container Platform Archlinux Samba Suse Redhat Tritondatacenter |
|
References | () https://access.redhat.com/security/cve/CVE-2024-12086 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2330577 - Issue Tracking, Third Party Advisory | |
References | () https://kb.cert.org/vuls/id/952657 - Third Party Advisory | |
References | () https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-mvqj - Exploit, Third Party Advisory | |
CPE | cpe:2.3:o:suse:suse_linux:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:almalinux:almalinux:8.0:-:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* cpe:2.3:o:gentoo:linux:-:*:*:*:*:*:*:* cpe:2.3:o:archlinux:arch_linux:-:*:*:*:*:*:*:* cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:* cpe:2.3:o:almalinux:almalinux:10.0:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:almalinux:almalinux:9.0:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:tritondatacenter:smartos:*:*:*:*:*:*:*:* cpe:2.3:o:nixos:nixos:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
26 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
14 Jan 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Jan 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-14 18:15
Updated : 2025-06-20 18:40
NVD link : CVE-2024-12086
Mitre link : CVE-2024-12086
CVE.ORG link : CVE-2024-12086
JSON object : View
Products Affected
nixos
- nixos
archlinux
- arch_linux
almalinux
- almalinux
redhat
- openshift_container_platform
- enterprise_linux
samba
- rsync
tritondatacenter
- smartos
suse
- suse_linux
gentoo
- linux
CWE
CWE-390
Detection of Error Condition Without Action