CVE-2026-45232

NameCVE-2026-45232
DescriptionRsync versions before 3.4.3 contain an off-by-one out-of-bounds stack write vulnerability in the establish_proxy_connection() function in socket.c that allows network attackers to corrupt stack memory by sending a malformed HTTP proxy response. Attackers can exploit this by positioning themselves between the client and proxy or controlling the proxy server to send a response line of 1023 or more bytes without a newline terminator, causing a null byte to be written to an out-of-bounds stack address when the RSYNC_PROXY environment variable is set.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rsync (PTS)bullseye3.2.3-4+deb11u1vulnerable
bullseye (security)3.2.3-4+deb11u4vulnerable
bookworm3.2.7-1+deb12u4vulnerable
bookworm (security)3.2.7-1+deb12u5vulnerable
trixie3.4.1+ds1-5+deb13u2vulnerable
trixie (security)3.4.1+ds1-5+deb13u3vulnerable
forky3.4.2+ds1-2vulnerable
sid3.4.3+ds1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rsyncsource(unstable)3.4.3+ds1-1

Notes

[trixie] - rsync <no-dsa> (Minor issue)
[bookworm] - rsync <no-dsa> (Minor issue)
https://download.samba.org/pub/rsync/NEWS#3.4.3
https://www.openwall.com/lists/oss-security/2026/05/20/6

Search for package or bug name: Reporting problems