Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-10158

Опубликовано: 18 нояб. 2025
Источник: debian
EPSS Низкий

Описание

A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rsyncfixed3.4.1+ds1-7package
rsyncfixed3.4.1+ds1-5+deb13u1trixiepackage
rsyncfixed3.2.7-1+deb12u4bookwormpackage
rsyncignoredbullseyepackage

Примечания

  • Fixed by: https://github.com/RsyncProject/rsync/commit/797e17fc4a6f15e3b1756538a9f812b63942686f

EPSS

Процентиль: 17%
0.00053
Низкий

Связанные уязвимости

CVSS3: 4.3
ubuntu
3 месяца назад

A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue.

CVSS3: 4.3
nvd
3 месяца назад

A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue.

CVSS3: 5.4
msrc
3 месяца назад

Rsync: Out of bounds array access via negative index

suse-cvrf
около 1 месяца назад

Security update for rsync

suse-cvrf
около 2 месяцев назад

Security update for rsync

EPSS

Процентиль: 17%
0.00053
Низкий