In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Debian:12
rsync
to version 3.2.7-1+deb12u1 or higher.
Note: Versions mentioned in the description apply only to the upstream rsync
package and not the rsync
package as distributed by Debian
.
See How to fix?
for Debian:12
relevant fixed versions and status.
A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.