A malicious client acting as the receiver of an rsync...
Moderate severity
Unreviewed
Published
Nov 18, 2025
to the GitHub Advisory Database
•
Updated Nov 18, 2025
Description
Published by the National Vulnerability Database
Nov 18, 2025
Published to the GitHub Advisory Database
Nov 18, 2025
Last updated
Nov 18, 2025
A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The
malicious
rsync client requires at least read access to the remote rsync module in order to trigger the issue.
References