A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2024-12086 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2330577 | Issue Tracking Third Party Advisory |
https://kb.cert.org/vuls/id/952657 | Third Party Advisory |
https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-mvqj | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
20 Jun 2025, 18:40
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:archlinux:arch_linux:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:almalinux:almalinux:8.0:-:*:*:*:*:*:* cpe:2.3:o:almalinux:almalinux:10.0:-:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:suse:suse_linux:-:*:*:*:*:*:*:* cpe:2.3:o:gentoo:linux:-:*:*:*:*:*:*:* cpe:2.3:o:tritondatacenter:smartos:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:almalinux:almalinux:9.0:-:*:*:*:*:*:* cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:nixos:nixos:*:*:*:*:*:*:*:* |
|
References | () https://access.redhat.com/security/cve/CVE-2024-12086 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2330577 - Issue Tracking, Third Party Advisory | |
References | () https://kb.cert.org/vuls/id/952657 - Third Party Advisory | |
References | () https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-mvqj - Exploit, Third Party Advisory | |
First Time |
Nixos nixos
Tritondatacenter smartos Suse Redhat enterprise Linux Archlinux Samba Almalinux Suse suse Linux Gentoo linux Archlinux arch Linux Almalinux almalinux Tritondatacenter Redhat Gentoo Nixos Redhat openshift Container Platform Samba rsync |
26 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
14 Jan 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Jan 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-14 18:15
Updated : 2025-06-20 18:40
NVD link : CVE-2024-12086
Mitre link : CVE-2024-12086
CVE.ORG link : CVE-2024-12086
JSON object : View
Products Affected
tritondatacenter
- smartos
redhat
- enterprise_linux
- openshift_container_platform
suse
- suse_linux
archlinux
- arch_linux
samba
- rsync
nixos
- nixos
almalinux
- almalinux
gentoo
- linux
CWE
CWE-390
Detection of Error Condition Without Action