Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2026-6390

Опубликовано: 01 апр. 2026
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2026-6390: rsync security update (MODERATE)

[3.2.5-3.2]

  • Resolves: RHEL-152888 - CVE-2025-10158 Out of bounds array access via negative index

[3.2.5-3.1]

  • Resolves: RHEL-152879 - clearing DISPLAY breaks SSH_ASKPASS expectations

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

rsync

3.2.5-3.el9_7.2

rsync-daemon

3.2.5-3.el9_7.2

rsync-rrsync

3.2.5-3.el9_7.2

Oracle Linux x86_64

rsync

3.2.5-3.el9_7.2

rsync-daemon

3.2.5-3.el9_7.2

rsync-rrsync

3.2.5-3.el9_7.2

Связанные CVE

Связанные уязвимости

CVSS3: 4.3
ubuntu
5 месяцев назад

A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue.

CVSS3: 4.3
redhat
5 месяцев назад

A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue.

CVSS3: 4.3
nvd
5 месяцев назад

A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue.

CVSS3: 5.4
msrc
5 месяцев назад

Rsync: Out of bounds array access via negative index

CVSS3: 4.3
debian
5 месяцев назад

A malicious client acting as the receiver of an rsync file transfer ca ...