Impact
The vulnerability is an out‑of‑bounds array read in the recv_files() function of rsync receivers. By manipulating the CF_INC_RECURSE compatibility flag and supplying a crafted file list that begins with a non‑dot directory, an attacker can cause the receiver to read 8 bytes before the allocated pointer array, dereference an invalid pointer, and trigger a deterministic segmentation fault. This results in a client crash and denial of service.
Affected Systems
Affecting installations of RsyncProject’s rsync 3.4.2 or earlier, any system that runs these versions and accepts synchronizations from untrusted sources may be impacted. The fix is available in rsync 3.4.3 and later releases.
Risk and Exploitability
The CVSS score of 6.9 reflects a moderate impact limited to service disruption. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires a malicious rsync server that can set the CF_INC_RECURSE flag and send a specially crafted file list. Because the flaw is client‑side, only connections using the rsync protocol are relevant, and it does not provide code execution or data exfiltration.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN