A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2024-12086 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2330577 | Issue Tracking Third Party Advisory |
https://kb.cert.org/vuls/id/952657 | Third Party Advisory |
https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-mvqj | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
20 Jun 2025, 18:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2024-12086 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2330577 - Issue Tracking, Third Party Advisory | |
References | () https://kb.cert.org/vuls/id/952657 - Third Party Advisory | |
References | () https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-mvqj - Exploit, Third Party Advisory | |
CPE | cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* cpe:2.3:o:almalinux:almalinux:8.0:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:archlinux:arch_linux:-:*:*:*:*:*:*:* cpe:2.3:o:nixos:nixos:*:*:*:*:*:*:*:* cpe:2.3:o:suse:suse_linux:-:*:*:*:*:*:*:* cpe:2.3:o:gentoo:linux:-:*:*:*:*:*:*:* cpe:2.3:o:almalinux:almalinux:10.0:-:*:*:*:*:*:* cpe:2.3:o:tritondatacenter:smartos:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:* cpe:2.3:o:almalinux:almalinux:9.0:-:*:*:*:*:*:* |
|
First Time |
Suse suse Linux
Redhat Archlinux arch Linux Samba rsync Almalinux Redhat openshift Container Platform Gentoo Nixos Nixos nixos Tritondatacenter Archlinux Suse Samba Tritondatacenter smartos Gentoo linux Almalinux almalinux Redhat enterprise Linux |
26 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
14 Jan 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Jan 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-14 18:15
Updated : 2025-06-20 18:40
NVD link : CVE-2024-12086
Mitre link : CVE-2024-12086
CVE.ORG link : CVE-2024-12086
JSON object : View
Products Affected
almalinux
- almalinux
redhat
- enterprise_linux
- openshift_container_platform
samba
- rsync
suse
- suse_linux
gentoo
- linux
tritondatacenter
- smartos
nixos
- nixos
archlinux
- arch_linux
CWE
CWE-390
Detection of Error Condition Without Action