A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The

malicious

rsync client requires at least read access to the remote rsync module in order to trigger the issue.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 18 Nov 2025 15:00:00 +0000


Tue, 18 Nov 2025 14:30:00 +0000

Type Values Removed Values Added
Description A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue.
Title Rsync: Out of bounds array access via negative index
Weaknesses CWE-129
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: rapid7

Published:

Updated: 2025-11-18T14:45:58.065Z

Reserved: 2025-09-09T11:15:17.585Z

Link: CVE-2025-10158

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-18T15:16:25.433

Modified: 2025-11-18T15:16:25.433

Link: CVE-2025-10158

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.