Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-10158

Опубликовано: 18 нояб. 2025
Источник: debian
EPSS Низкий

Описание

A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rsyncfixed3.4.1+ds1-7package
rsyncfixed3.4.1+ds1-5+deb13u1trixiepackage
rsyncfixed3.2.7-1+deb12u4bookwormpackage
rsyncignoredbullseyepackage

Примечания

  • Fixed by: https://github.com/RsyncProject/rsync/commit/797e17fc4a6f15e3b1756538a9f812b63942686f

EPSS

Процентиль: 20%
0.00065
Низкий

Связанные уязвимости

CVSS3: 4.3
ubuntu
5 месяцев назад

A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue.

CVSS3: 4.3
redhat
5 месяцев назад

A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue.

CVSS3: 4.3
nvd
5 месяцев назад

A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue.

CVSS3: 5.4
msrc
5 месяцев назад

Rsync: Out of bounds array access via negative index

suse-cvrf
3 месяца назад

Security update for rsync

EPSS

Процентиль: 20%
0.00065
Низкий