Описание
A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 3.3.0+ds1-4 |
esm-infra-legacy/trusty | released | 3.1.0-2ubuntu0.4+esm1 |
esm-infra/bionic | released | 3.1.2-2.1ubuntu1.6+esm1 |
esm-infra/focal | not-affected | 3.1.3-8ubuntu0.8 |
esm-infra/xenial | released | 3.1.1-3ubuntu1.3+esm3 |
focal | released | 3.1.3-8ubuntu0.8 |
jammy | released | 3.2.7-0ubuntu0.22.04.3 |
noble | released | 3.2.7-1ubuntu1.1 |
oracular | released | 3.3.0-1ubuntu0.1 |
trusty/esm | ignored | end of ESM support, was needed |
Показывать по
EPSS
7.5 High
CVSS3
Связанные уязвимости
A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.
A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.
A flaw was found in rsync which could be triggered when rsync compares ...
EPSS
7.5 High
CVSS3