diff --git a/data/cve/CVE-2024-12084.json b/data/cve/CVE-2024-12084.json index b578bc6af79a96b14f70c50646376511b55c73fd..a514ac8c28d52d9721fde8a7a05d69f08831b01b 100644 --- a/data/cve/CVE-2024-12084.json +++ b/data/cve/CVE-2024-12084.json @@ -51,19 +51,19 @@ "rsync" ], "score": 9.8, - "severity": "None", + "severity": "Critical", "status": 1, "source": "Mitre", "cve_source_link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12084", "abstract": "A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.", - "description": null, + "description": "This vulnerability only affects a limited range of Rsync versions, rsync-3.2.7 and rsync-3.3.0. Red Hat Enterprise Linux does not ship these versions of Rsync and is not affected.", "issue": null, - "acknowledgements": null, - "acknowledgements_en": null, + "acknowledgements": "", + "acknowledgements_en": "", "reference": null, "diagnose": null, "statement": null, "mitigation": null, - "update_user": null, + "update_user": "Shiloong", "errata": [] } \ No newline at end of file