🔐 CVE Alert

CVE-2026-43620

MEDIUM 6.5

Rsync < 3.4.3 Out-of-Bounds Array Read via recv_files()

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
9th

Rsync version 3.4.2 and prior contain a receiver-side out-of-bounds array read vulnerability in recv_files() in receiver.c that allows a malicious rsync server to crash the rsync client process. Attackers can exploit the vulnerability by setting CF_INC_RECURSE in compatibility flags and sending a specially crafted file list where the first sorted entry is not the leading dot directory, followed by a transfer record with ndx=0 and an iflag word without ITEM_TRANSFER, causing the receiver to read 8 bytes before the allocated pointer array and dereference an invalid pointer at an unmapped address, resulting in a deterministic SIGSEGV crash of the rsync client.

CWE CWE-125
Vendor rsyncproject
Product rsync
Published May 20, 2026
Last Updated May 20, 2026
Stay Ahead of the Next One

Get instant alerts for rsyncproject rsync

Be the first to know when new medium vulnerabilities affecting rsyncproject rsync are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

RsyncProject / rsync
0 < 3.4.3

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/RsyncProject/rsync/security/advisories/GHSA-28pw-r563-rxvm github.com: https://github.com/RsyncProject/rsync/releases/tag/v3.4.3 vulncheck.com: https://www.vulncheck.com/advisories/rsync-out-of-bounds-array-read-via-recv-files

Credits

Pratham Gupta (@prathamgupta36)