CVE-2025-10158
Publication date 18 November 2025
Last updated 20 May 2026
Ubuntu priority
Cvss 3 Severity Score
Description
A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The malicious rsync client requires at least read access to the remote rsync module in order to trigger the issue.
Why is this CVE low priority?
Per rsync developers, can't be leveraged into an exploit
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| rsync | 26.04 LTS resolute |
Fixed 3.4.1+ds1-7
|
| 25.10 questing |
Fixed 3.4.1+ds1-5ubuntu1.2
|
|
| 24.04 LTS noble |
Fixed 3.2.7-1ubuntu1.4
|
|
| 22.04 LTS jammy |
Fixed 3.2.7-0ubuntu0.22.04.6
|
|
| 20.04 LTS focal |
Needs evaluation
|
|
| 18.04 LTS bionic |
Needs evaluation
|
|
| 16.04 LTS xenial |
Needs evaluation
|
|
| 14.04 LTS trusty |
Needs evaluation
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | Low |
| Availability impact | None |
| Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-8283-1
- rsync vulnerabilities
- 20 May 2026