| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4591-1 | rsync security update |
Debian DSA |
DSA-6282-1 | rsync security update |
Ubuntu USN |
USN-8283-1 | rsync vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 20 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rsync Project
Rsync Project rsync |
|
| Vendors & Products |
Rsync Project
Rsync Project rsync |
Wed, 20 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rsync versionĀ 3.4.2 and prior contain a receiver-side out-of-bounds array read vulnerability in recv_files() in receiver.c that allows a malicious rsync server to crash the rsync client process. Attackers can exploit the vulnerability by setting CF_INC_RECURSE in compatibility flags and sending a specially crafted file list where the first sorted entry is not the leading dot directory, followed by a transfer record with ndx=0 and an iflag word without ITEM_TRANSFER, causing the receiver to read 8 bytes before the allocated pointer array and dereference an invalid pointer at an unmapped address, resulting in a deterministic SIGSEGV crash of the rsync client. | |
| Title | Rsync < 3.4.3 Out-of-Bounds Array Read via recv_files() | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-20T14:11:50.942Z
Reserved: 2026-05-01T18:22:45.639Z
Link: CVE-2026-43620
Updated: 2026-05-20T14:11:47.395Z
Status : Awaiting Analysis
Published: 2026-05-20T02:16:36.727
Modified: 2026-05-20T13:58:07.923
Link: CVE-2026-43620
No data.
OpenCVE Enrichment
Updated: 2026-05-20T10:38:41Z
Debian DLA
Debian DSA
Ubuntu USN