Source: rsync
Version: 3.4.1+ds1-6
Severity: normal
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for rsync.

CVE-2025-10158[0]:
| A malicious client acting as the receiver of an rsync file transfer
| can trigger an out of bounds read of a heap based buffer, via a
| negative array index. The   malicious   rsync client requires at
| least read access to the remote rsync module in order to trigger the
| issue.

My understanding of the change, the commit description and issue
description seesm that this is not really dramatic. Still filling to
have a tracking reference of the bug (wich has a CVE associated).

IMHO can be either fixed via cherry-picking the fix for unstable or
waiting for a new upstream version including it. For trixie and
bookworm we have marked the CVE as no-dsa.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-10158
    https://www.cve.org/CVERecord?id=CVE-2025-10158
[1] 
https://github.com/RsyncProject/rsync/commit/797e17fc4a6f15e3b1756538a9f812b63942686f

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to