First published: Thu Dec 05 2024(Updated: )
A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/rsync | <=3.2.3-4+deb11u1<=3.2.7-1 | 3.2.3-4+deb11u3 3.2.7-1+deb12u2 3.3.0+ds1-4 |
F5 BIG-IP and BIG-IQ Centralized Management |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-12085 is considered a moderate severity vulnerability that can lead to the disclosure of sensitive information.
To fix CVE-2024-12085, you should upgrade to a patched version of rsync, specifically 3.2.3-4+deb11u3, 3.2.7-1+deb12u2, or 3.3.0+ds1-4.
CVE-2024-12085 affects specific versions of the rsync package, including versions up to 3.2.3-4+deb11u1 and 3.2.7-1.
CVE-2024-12085 is a memory corruption vulnerability that can leak one byte of uninitialized stack data.
There are no known effective workarounds for CVE-2024-12085, making upgrading to a fixed version essential.