9.8 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @fricklerhandwerk Activity log
- Created automatic suggestion
- @LeSuisse accepted
- @fricklerhandwerk added maintainer @fricklerhandwerk maintainer.add
-
@fricklerhandwerk
deleted
maintainer.delete
2 maintainers
- @fricklerhandwerk
- @ehmry
- @fricklerhandwerk ignored package rsync
- @fricklerhandwerk restored package rsync
- @fricklerhandwerk added maintainer @fricklerhandwerk maintainer.add
Rsync: heap buffer overflow in rsync due to improper checksum length handling
A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
References
Affected products
- ==3.2.7
- *
- ==3.3.0
Package maintainers
-
@kampfschlaefer Arnold Krille <arnold@arnoldarts.de>
-
@ivan Ivan Kozik <ivan@ludios.org>
Ignored maintainers (1)
-
@ehmry Emery Hemingway <ehmry@posteo.net>
Additional maintainers
-
@fricklerhandwerk Valentin Gagarin <valentin@fricklerhandwerk.de>