CVE-2026-43618
Publication date 20 May 2026
Last updated 22 May 2026
Ubuntu priority
Cvss 3 Severity Score
Description
Rsync versionĀ 3.4.2 and prior contain an integer overflow vulnerability in the compressed-token decoder where a 32-bit signed counter is not checked for overflow, allowing a malicious sender to trigger an overflow that causes the receiver process to read and return data from outside the intended buffer bounds. Attackers can exploit this vulnerability to disclose process memory contents including environment variables, passwords, heap and stack data, and library memory pointers, significantly reducing ASLR effectiveness and facilitating further exploitation.
Why is this CVE high priority?
rsync developers have rated this as being a high severity issue
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| rsync | 26.04 LTS resolute |
Fixed 3.4.1+ds1-7ubuntu0.2
|
| 25.10 questing |
Fixed 3.4.1+ds1-5ubuntu1.2
|
|
| 24.04 LTS noble |
Fixed 3.2.7-1ubuntu1.4
|
|
| 22.04 LTS jammy |
Fixed 3.2.7-0ubuntu0.22.04.6
|
|
| 20.04 LTS focal |
Needs evaluation
|
|
| 18.04 LTS bionic |
Needs evaluation
|
|
| 16.04 LTS xenial |
Needs evaluation
|
|
| 14.04 LTS trusty |
Needs evaluation
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | None |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-8283-1
- rsync vulnerabilities
- 20 May 2026