A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The
malicious
rsync client requires at least read access to the remote rsync module in order to trigger the issue.
[
{
"signature_version": "v1",
"source": "https://github.com/rsyncproject/rsync/commit/797e17fc4a6f15e3b1756538a9f812b63942686f",
"signature_type": "Line",
"target": {
"file": "sender.c"
},
"id": "CVE-2025-10158-bcf96e17",
"digest": {
"line_hashes": [
"302522342547183590147378482819186831486",
"231127123143983042932145774729305165212",
"16783007572549312456326176941612218547",
"129672789525610898114228627121060680503"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://github.com/rsyncproject/rsync/commit/797e17fc4a6f15e3b1756538a9f812b63942686f",
"signature_type": "Function",
"target": {
"function": "send_files",
"file": "sender.c"
},
"id": "CVE-2025-10158-beaa7963",
"digest": {
"length": 6321.0,
"function_hash": "216608191418843112593752989695782574678"
},
"deprecated": false
}
]