A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
2025-01-15T15:15:10.537
2025-07-08T04:15:35.820
Modified
CVSSv3.1: 9.8 (CRITICAL)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | samba | rsync | 3.2.7 | Yes |
Application | samba | rsync | 3.3.0 | Yes |
Operating System | almalinux | almalinux | 10.0 | Yes |
Operating System | archlinux | arch_linux | - | Yes |
Operating System | gentoo | linux | - | Yes |
Operating System | nixos | nixos | < 24.11 | Yes |
Operating System | nixos | nixos | 24.11 | Yes |
Operating System | novell | suse_linux | - | Yes |
Operating System | tritondatacenter | smartos | < 20250123 | Yes |
Operating System | redhat | enterprise_linux | 10.0 | Yes |