Home / mailingsPDF  

[USN-8283-1] rsync vulnerabilities

Posted on 20 May 2026
Ubuntu Security

==========================================================================Ubuntu Security Notice USN-8283-1
May 20, 2026

rsync vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 26.04 LTS
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in rsync.

Software Description:
- rsync: fast, versatile, remote (and local) file-copying tool

Details:

Calum Hutton discovered that rsync contained a heap-based out-of-bounds
read when handling file transfers. A remote attacker with read access
to an rsync server could possibly use this issue to cause a denial of
service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS,
and Ubuntu 25.10. (CVE-2025-10158)

Batuhan Sancak, Damien Neil, and Michael Stapelberg discovered that
rsync daemons configured without chroot protection were exposed to a
race condition on parent path components. A local attacker with write
access to a module could possibly use this issue to overwrite files,
obtain sensitive information, or escalate privileges.
(CVE-2026-29518)

It was discovered that rsync did not properly validate a length value
while sorting extended attributes. An attacker could possibly use this
issue to cause a denial of service. (CVE-2026-41035)

It was discovered that rsync performed reverse-DNS lookups after
chrooting in some daemon configurations. A remote attacker could
possibly use this issue to bypass hostname-based access controls and
access network services. (CVE-2026-43617)

Omar Elsayed discovered that rsync did not properly check for integer
overflows while decoding compressed tokens. A remote attacker could
possibly use this issue to obtain sensitive information.
(CVE-2026-43618)

Andrew Tridgell discovered that rsync did not fully fix a symlink race
condition in path-based system calls for daemons configured without
chroot protection. A local attacker could possibly use this issue to
overwrite files, obtain sensitive information, or escalate privileges.
(CVE-2026-43619)

Pratham Gupta discovered that rsync did not properly validate an index
while processing file lists. A remote attacker could possibly use this
issue to cause rsync to crash, resulting in a denial of service.
(CVE-2026-43620)

Michal Ruprich discovered that rsync contained an off-by-one error
while handling HTTP proxy responses. An attacker able to intercept network
communications or a malicious proxy server could possibly use this issue to
cause a denial of service. (CVE-2026-45232)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 26.04 LTS
rsync 3.4.1+ds1-7ubuntu0.2

Ubuntu 25.10
rsync 3.4.1+ds1-5ubuntu1.2

Ubuntu 24.04 LTS
rsync 3.2.7-1ubuntu1.4

Ubuntu 22.04 LTS
rsync 3.2.7-0ubuntu0.22.04.6

In general, a standard system update will make all the necessary
changes. After a standard system update you need to restart rsync
daemons if configured to make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8283-1
CVE-2025-10158, CVE-2026-29518, CVE-2026-41035, CVE-2026-43617,
CVE-2026-43618, CVE-2026-43619, CVE-2026-43620, CVE-2026-45232

Package Information:
https://launchpad.net/ubuntu/+source/rsync/3.4.1+ds1-7ubuntu0.2
https://launchpad.net/ubuntu/+source/rsync/3.4.1+ds1-5ubuntu1.2
https://launchpad.net/ubuntu/+source/rsync/3.2.7-1ubuntu1.4
https://launchpad.net/ubuntu/+source/rsync/3.2.7-0ubuntu0.22.04.6

--===============7979783337573734552==Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature

 

TOP