Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestion detail

Accepted
Permalink CVE-2024-12084
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 5 days ago by @fricklerhandwerk Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @fricklerhandwerk added maintainer @fricklerhandwerk maintainer.add
  • @fricklerhandwerk deleted
    2 maintainers
    • @fricklerhandwerk
    • @ehmry
    maintainer.delete
  • @fricklerhandwerk ignored package rsync
  • @fricklerhandwerk restored package rsync
  • @fricklerhandwerk added maintainer @fricklerhandwerk maintainer.add
Rsync: heap buffer overflow in rsync due to improper checksum length handling

A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.

References

Affected products

rhcos
rsync
  • ==3.2.7
  • *
  • ==3.3.0

Matching in nixpkgs

pkgs.rsync

Fast incremental file transfer utility

Package maintainers

Ignored maintainers (1)

Additional maintainers