CVE-2026-43619
Publication date 20 May 2026
Last updated 21 May 2026
Ubuntu priority
Description
Earlier fixes for symlink races on the receiver's open() call (CVE-2026-29518) missed the same race class on every other path-based system call: chmod, lchown, utimes, rename, unlink, mkdir, symlink, mknod, link, rmdir, lstat. On rsync daemons with "use chroot = no" a local attacker with filesystem access on the daemon host can swap a symlink into a parent directory component between the receiver's check and one of these syscalls, redirecting it outside the exported module. The fix routes each affected path-based syscall through a parent dirfd opened under RESOLVE_BENEATH-equivalent kernel-enforced confinement (openat2 on Linux 5.6+, O_RESOLVE_BENEATH on FreeBSD 13+ and macOS 15+, per-component O_NOFOLLOW walk elsewhere). Default "use chroot = yes" is not exposed.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| rsync | 26.04 LTS resolute |
Fixed 3.4.1+ds1-7ubuntu0.2
|
| 25.10 questing |
Fixed 3.4.1+ds1-5ubuntu1.2
|
|
| 24.04 LTS noble |
Fixed 3.2.7-1ubuntu1.4
|
|
| 22.04 LTS jammy |
Fixed 3.2.7-0ubuntu0.22.04.6
|
|
| 20.04 LTS focal |
Needs evaluation
|
|
| 18.04 LTS bionic |
Needs evaluation
|
|
| 16.04 LTS xenial |
Needs evaluation
|
|
| 14.04 LTS trusty |
Needs evaluation
|
References
Related Ubuntu Security Notices (USN)
- USN-8283-1
- rsync vulnerabilities
- 20 May 2026