A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
| Software | From | Fixed in |
|---|---|---|
| samba / rsync | 3.2.7 | 3.2.7.x |
| samba / rsync | 3.3.0 | 3.3.0.x |
| almalinux / almalinux | 10.0 | 10.0.x |
| nixos / nixos | - | 24.11 |
| nixos / nixos | 24.11 | 24.11.x |
| tritondatacenter / smartos | - | 20250123 |
| redhat / enterprise_linux | 10.0 | 10.0.x |