CVE-2026-43619

Publication date 20 May 2026

Last updated 21 May 2026


Ubuntu priority

Description

Earlier fixes for symlink races on the receiver's open() call (CVE-2026-29518) missed the same race class on every other path-based system call: chmod, lchown, utimes, rename, unlink, mkdir, symlink, mknod, link, rmdir, lstat. On rsync daemons with "use chroot = no" a local attacker with filesystem access on the daemon host can swap a symlink into a parent directory component between the receiver's check and one of these syscalls, redirecting it outside the exported module. The fix routes each affected path-based syscall through a parent dirfd opened under RESOLVE_BENEATH-equivalent kernel-enforced confinement (openat2 on Linux 5.6+, O_RESOLVE_BENEATH on FreeBSD 13+ and macOS 15+, per-component O_NOFOLLOW walk elsewhere). Default "use chroot = yes" is not exposed.

Status

Package Ubuntu Release Status
rsync 26.04 LTS resolute
Fixed 3.4.1+ds1-7ubuntu0.2
25.10 questing
Fixed 3.4.1+ds1-5ubuntu1.2
24.04 LTS noble
Fixed 3.2.7-1ubuntu1.4
22.04 LTS jammy
Fixed 3.2.7-0ubuntu0.22.04.6
20.04 LTS focal
Needs evaluation
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
14.04 LTS trusty
Needs evaluation

References

Related Ubuntu Security Notices (USN)

Other references


Access our resources on patching vulnerabilities