发布时间: 2025年1月17日
修改时间: 2025年1月17日
A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
NVD | openEuler | |
---|---|---|
Confidentiality | High | |
Attack Vector | Network | |
CVSS评分 | N/A | 9.8 |
Attack Complexity | Low | |
Privileges Required | None | |
Scope | Unchanged | |
Integrity | High | |
User Interaction | None | |
Availability | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2025-1253 | rsync security update | 2025年3月6日 |
产品 | 包 | 状态 |
---|---|---|
V6 | rsync | Fixed |