A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAXDIGESTLEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "3.2.7-NA"
},
{
"introduced": "0"
},
{
"last_affected": "3.3.0-NA"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "24.11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "24.11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "20250123"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-12084.json"