Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-45232 (GCVE-0-2026-45232)
Vulnerability from cvelistv5 – Published: 2026-05-20 00:45 – Updated: 2026-05-20 17:31 X_Open Source
VLAI?
EPSS
Title
Rsync < 3.4.3 Off-by-One Stack Write via HTTP Proxy
Summary
Rsync versions before 3.4.3 contain an off-by-one out-of-bounds stack write vulnerability in the establish_proxy_connection() function in socket.c that allows network attackers to corrupt stack memory by sending a malformed HTTP proxy response. Attackers can exploit this by positioning themselves between the client and proxy or controlling the proxy server to send a response line of 1023 or more bytes without a newline terminator, causing a null byte to be written to an out-of-bounds stack address when the RSYNC_PROXY environment variable is set.
Severity ?
CWE
- CWE-193 - Off-by-one Error
Assigner
References
3 references
| URL | Tags |
|---|---|
| https://github.com/RsyncProject/rsync/security/ad… | vendor-advisory |
| https://github.com/RsyncProject/rsync/releases/ta… | release-notes |
| https://www.vulncheck.com/advisories/rsync-off-by… | third-party-advisory |
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| RsyncProject | rsync |
Affected:
0 , < 3.4.3
(semver)
|
Date Public ?
2026-05-19 00:00
Credits
Michal Ruprich
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-45232",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-20T17:30:10.337296Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-20T17:31:52.358Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "rsync",
"repo": "https://github.com/RsyncProject/rsync",
"vendor": "RsyncProject",
"versions": [
{
"lessThan": "3.4.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michal Ruprich"
}
],
"datePublic": "2026-05-19T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Rsync versions before 3.4.3 contain an off-by-one out-of-bounds stack write vulnerability in the establish_proxy_connection() function in socket.c that allows network attackers to corrupt stack memory by sending a malformed HTTP proxy response. Attackers can exploit this by positioning themselves between the client and proxy or controlling the proxy server to send a response line of 1023 or more bytes without a newline terminator, causing a null byte to be written to an out-of-bounds stack address when the RSYNC_PROXY environment variable is set."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 2.1,
"baseSeverity": "LOW",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "ACTIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-193",
"description": "Off-by-one Error",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-20T00:45:28.540Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://github.com/RsyncProject/rsync/security/advisories/GHSA-8f85-j2cv-59m8"
},
{
"tags": [
"release-notes"
],
"url": "https://github.com/RsyncProject/rsync/releases/tag/v3.4.3"
},
{
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/rsync-off-by-one-stack-write-via-http-proxy"
}
],
"source": {
"discovery": "EXTERNAL"
},
"tags": [
"x_open-source"
],
"title": "Rsync \u003c 3.4.3 Off-by-One Stack Write via HTTP Proxy",
"x_generator": {
"engine": "Vulnogram 1.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2026-45232",
"datePublished": "2026-05-20T00:45:28.540Z",
"dateReserved": "2026-05-11T14:14:49.612Z",
"dateUpdated": "2026-05-20T17:31:52.358Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-45232",
"date": "2026-05-24",
"epss": "0.00039",
"percentile": "0.11981"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-45232\",\"sourceIdentifier\":\"disclosure@vulncheck.com\",\"published\":\"2026-05-20T02:16:36.887\",\"lastModified\":\"2026-05-21T20:52:56.780\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rsync versions before 3.4.3 contain an off-by-one out-of-bounds stack write vulnerability in the establish_proxy_connection() function in socket.c that allows network attackers to corrupt stack memory by sending a malformed HTTP proxy response. Attackers can exploit this by positioning themselves between the client and proxy or controlling the proxy server to send a response line of 1023 or more bytes without a newline terminator, causing a null byte to be written to an out-of-bounds stack address when the RSYNC_PROXY environment variable is set.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":2.1,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"ACTIVE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L\",\"baseScore\":3.1,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.6,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-193\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.4.3\",\"matchCriteriaId\":\"BBA148E3-868F-4A1F-AAD0-16FE15A265DC\"}]}]}],\"references\":[{\"url\":\"https://github.com/RsyncProject/rsync/releases/tag/v3.4.3\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/RsyncProject/rsync/security/advisories/GHSA-8f85-j2cv-59m8\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.vulncheck.com/advisories/rsync-off-by-one-stack-write-via-http-proxy\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-45232\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-05-20T17:30:10.337296Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-05-20T17:30:48.307Z\"}}], \"cna\": {\"tags\": [\"x_open-source\"], \"title\": \"Rsync \u003c 3.4.3 Off-by-One Stack Write via HTTP Proxy\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Michal Ruprich\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 2.1, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"ACTIVE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"LOW\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/RsyncProject/rsync\", \"vendor\": \"RsyncProject\", \"product\": \"rsync\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"3.4.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2026-05-19T00:00:00.000Z\", \"references\": [{\"url\": \"https://github.com/RsyncProject/rsync/security/advisories/GHSA-8f85-j2cv-59m8\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://github.com/RsyncProject/rsync/releases/tag/v3.4.3\", \"tags\": [\"release-notes\"]}, {\"url\": \"https://www.vulncheck.com/advisories/rsync-off-by-one-stack-write-via-http-proxy\", \"tags\": [\"third-party-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 1.0.1\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Rsync versions before 3.4.3 contain an off-by-one out-of-bounds stack write vulnerability in the establish_proxy_connection() function in socket.c that allows network attackers to corrupt stack memory by sending a malformed HTTP proxy response. Attackers can exploit this by positioning themselves between the client and proxy or controlling the proxy server to send a response line of 1023 or more bytes without a newline terminator, causing a null byte to be written to an out-of-bounds stack address when the RSYNC_PROXY environment variable is set.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-193\", \"description\": \"Off-by-one Error\"}]}], \"providerMetadata\": {\"orgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"shortName\": \"VulnCheck\", \"dateUpdated\": \"2026-05-20T00:45:28.540Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-45232\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-20T17:31:52.358Z\", \"dateReserved\": \"2026-05-11T14:14:49.612Z\", \"assignerOrgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"datePublished\": \"2026-05-20T00:45:28.540Z\", \"assignerShortName\": \"VulnCheck\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-45232
Vulnerability from fkie_nvd - Published: 2026-05-20 02:16 - Updated: 2026-05-21 20:52
Severity ?
3.1 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Summary
Rsync versions before 3.4.3 contain an off-by-one out-of-bounds stack write vulnerability in the establish_proxy_connection() function in socket.c that allows network attackers to corrupt stack memory by sending a malformed HTTP proxy response. Attackers can exploit this by positioning themselves between the client and proxy or controlling the proxy server to send a response line of 1023 or more bytes without a newline terminator, causing a null byte to be written to an out-of-bounds stack address when the RSYNC_PROXY environment variable is set.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBA148E3-868F-4A1F-AAD0-16FE15A265DC",
"versionEndExcluding": "3.4.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rsync versions before 3.4.3 contain an off-by-one out-of-bounds stack write vulnerability in the establish_proxy_connection() function in socket.c that allows network attackers to corrupt stack memory by sending a malformed HTTP proxy response. Attackers can exploit this by positioning themselves between the client and proxy or controlling the proxy server to send a response line of 1023 or more bytes without a newline terminator, causing a null byte to be written to an out-of-bounds stack address when the RSYNC_PROXY environment variable is set."
}
],
"id": "CVE-2026-45232",
"lastModified": "2026-05-21T20:52:56.780",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4,
"source": "disclosure@vulncheck.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 2.1,
"baseSeverity": "LOW",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "ACTIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
]
},
"published": "2026-05-20T02:16:36.887",
"references": [
{
"source": "disclosure@vulncheck.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/RsyncProject/rsync/releases/tag/v3.4.3"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/RsyncProject/rsync/security/advisories/GHSA-8f85-j2cv-59m8"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vulncheck.com/advisories/rsync-off-by-one-stack-write-via-http-proxy"
}
],
"sourceIdentifier": "disclosure@vulncheck.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-193"
}
],
"source": "disclosure@vulncheck.com",
"type": "Primary"
}
]
}
MSRC_CVE-2026-45232
Vulnerability from csaf_microsoft - Published: 2026-05-02 00:00 - Updated: 2026-05-23 01:38Summary
Rsync < 3.4.3 Off-by-One Stack Write via HTTP Proxy
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
References
4 references
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-45232 Rsync \u003c 3.4.3 Off-by-One Stack Write via HTTP Proxy - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-45232.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Rsync \u003c 3.4.3 Off-by-One Stack Write via HTTP Proxy",
"tracking": {
"current_release_date": "2026-05-23T01:38:41.000Z",
"generator": {
"date": "2026-05-23T07:14:23.829Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-45232",
"initial_release_date": "2026-05-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-05-21T01:01:40.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-05-23T01:38:41.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 rsync 0:3.4.1-2.azl3",
"product": {
"name": "\u003cazl3 rsync 0:3.4.1-2.azl3",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 rsync 0:3.4.1-2.azl3",
"product": {
"name": "azl3 rsync 0:3.4.1-2.azl3",
"product_id": "20732"
}
}
],
"category": "product_name",
"name": "rsync"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 rsync 0:3.4.1-2.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rsync 0:3.4.1-2.azl3 as a component of Azure Linux 3.0",
"product_id": "20732-17084"
},
"product_reference": "20732",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-45232",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"notes": [
{
"category": "general",
"text": "VulnCheck",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20732-17084"
],
"known_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-45232 Rsync \u003c 3.4.3 Off-by-One Stack Write via HTTP Proxy - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-45232.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-21T01:01:40.000Z",
"details": "0:3.4.3-1.azl3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 3.1,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"17084-1"
]
}
],
"title": "Rsync \u003c 3.4.3 Off-by-One Stack Write via HTTP Proxy"
}
]
}
SUSE-SU-2026:2038-1
Vulnerability from csaf_suse - Published: 2026-05-21 13:33 - Updated: 2026-05-21 13:33Summary
Security update for rsync
Severity
Important
Notes
Title of the patch: Security update for rsync
Description of the patch: This update for rsync fixes the following issues
- CVE-2026-29518: Symlink-Race TOCTOU in Daemon (bsc#1264511).
- CVE-2026-41035: Count of entries mismatch can lead to a use-after-free (bsc#1262223)
- CVE-2026-43617: Authorization Bypass via Hostname Resolution (bsc#1264515).
- CVE-2026-43618: Integer Overflow Information Disclosure (bsc#1264512).
- CVE-2026-43619: Symlink Race Condition via Path-Based Syscalls (bsc#1264514).
- CVE-2026-43620: Out-of-Bounds Array Read via recv_files() (bsc#1264513).
- CVE-2026-45232: Off-by-one stack OOB write in HTTP CONNECT proxy response parsing (bsc#1265296).
Patchnames: SUSE-2026-2038,SUSE-SLE-Module-Basesystem-15-SP7-2026-2038,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-2038,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-2038
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
9.8 (Critical)
Affected products
Recommended
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
5.3 (Medium)
Affected products
Recommended
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.8 (High)
Affected products
Recommended
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
6.5 (Medium)
Affected products
Recommended
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.3 (Medium)
Affected products
Recommended
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.2 (High)
Affected products
Recommended
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.8 (Medium)
Affected products
Recommended
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.1 (High)
Affected products
Recommended
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
6.3 (Medium)
Affected products
Recommended
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.2 (Medium)
Affected products
Recommended
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
67 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rsync",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rsync fixes the following issues\n\n \n- CVE-2026-29518: Symlink-Race TOCTOU in Daemon (bsc#1264511).\n- CVE-2026-41035: Count of entries mismatch can lead to a use-after-free (bsc#1262223)\n- CVE-2026-43617: Authorization Bypass via Hostname Resolution (bsc#1264515).\n- CVE-2026-43618: Integer Overflow Information Disclosure (bsc#1264512).\n- CVE-2026-43619: Symlink Race Condition via Path-Based Syscalls (bsc#1264514).\n- CVE-2026-43620: Out-of-Bounds Array Read via recv_files() (bsc#1264513).\n- CVE-2026-45232: Off-by-one stack OOB write in HTTP CONNECT proxy response parsing (bsc#1265296).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-2038,SUSE-SLE-Module-Basesystem-15-SP7-2026-2038,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-2038,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-2038",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_2038-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:2038-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20262038-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:2038-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046686.html"
},
{
"category": "self",
"summary": "SUSE Bug 1234100",
"url": "https://bugzilla.suse.com/1234100"
},
{
"category": "self",
"summary": "SUSE Bug 1234101",
"url": "https://bugzilla.suse.com/1234101"
},
{
"category": "self",
"summary": "SUSE Bug 1234102",
"url": "https://bugzilla.suse.com/1234102"
},
{
"category": "self",
"summary": "SUSE Bug 1234103",
"url": "https://bugzilla.suse.com/1234103"
},
{
"category": "self",
"summary": "SUSE Bug 1234104",
"url": "https://bugzilla.suse.com/1234104"
},
{
"category": "self",
"summary": "SUSE Bug 1235475",
"url": "https://bugzilla.suse.com/1235475"
},
{
"category": "self",
"summary": "SUSE Bug 1254441",
"url": "https://bugzilla.suse.com/1254441"
},
{
"category": "self",
"summary": "SUSE Bug 1262223",
"url": "https://bugzilla.suse.com/1262223"
},
{
"category": "self",
"summary": "SUSE Bug 1264511",
"url": "https://bugzilla.suse.com/1264511"
},
{
"category": "self",
"summary": "SUSE Bug 1264512",
"url": "https://bugzilla.suse.com/1264512"
},
{
"category": "self",
"summary": "SUSE Bug 1264513",
"url": "https://bugzilla.suse.com/1264513"
},
{
"category": "self",
"summary": "SUSE Bug 1264514",
"url": "https://bugzilla.suse.com/1264514"
},
{
"category": "self",
"summary": "SUSE Bug 1264515",
"url": "https://bugzilla.suse.com/1264515"
},
{
"category": "self",
"summary": "SUSE Bug 1265296",
"url": "https://bugzilla.suse.com/1265296"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12084 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12085 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12086 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12087 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12088 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12747 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-10158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-10158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-29518 page",
"url": "https://www.suse.com/security/cve/CVE-2026-29518/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-41035 page",
"url": "https://www.suse.com/security/cve/CVE-2026-41035/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43617 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43618 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43619 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43620 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-45232 page",
"url": "https://www.suse.com/security/cve/CVE-2026-45232/"
}
],
"title": "Security update for rsync",
"tracking": {
"current_release_date": "2026-05-21T13:33:41Z",
"generator": {
"date": "2026-05-21T13:33:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:2038-1",
"initial_release_date": "2026-05-21T13:33:41Z",
"revision_history": [
{
"date": "2026-05-21T13:33:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-150600.3.21.1.aarch64",
"product": {
"name": "rsync-3.2.7-150600.3.21.1.aarch64",
"product_id": "rsync-3.2.7-150600.3.21.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-150600.3.21.1.i586",
"product": {
"name": "rsync-3.2.7-150600.3.21.1.i586",
"product_id": "rsync-3.2.7-150600.3.21.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-150600.3.21.1.ppc64le",
"product": {
"name": "rsync-3.2.7-150600.3.21.1.ppc64le",
"product_id": "rsync-3.2.7-150600.3.21.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-150600.3.21.1.s390x",
"product": {
"name": "rsync-3.2.7-150600.3.21.1.s390x",
"product_id": "rsync-3.2.7-150600.3.21.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-150600.3.21.1.x86_64",
"product": {
"name": "rsync-3.2.7-150600.3.21.1.x86_64",
"product_id": "rsync-3.2.7-150600.3.21.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-12084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12084"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12084",
"url": "https://www.suse.com/security/cve/CVE-2024-12084"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12084",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234100 for CVE-2024-12084",
"url": "https://bugzilla.suse.com/1234100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "critical"
}
],
"title": "CVE-2024-12084"
},
{
"cve": "CVE-2024-12085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12085"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12085",
"url": "https://www.suse.com/security/cve/CVE-2024-12085"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12085",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234101 for CVE-2024-12085",
"url": "https://bugzilla.suse.com/1234101"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-12085"
},
{
"cve": "CVE-2024-12086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12086"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client\u0027s machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12086",
"url": "https://www.suse.com/security/cve/CVE-2024-12086"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12086",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234102 for CVE-2024-12086",
"url": "https://bugzilla.suse.com/1234102"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-12086"
},
{
"cve": "CVE-2024-12087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12087"
}
],
"notes": [
{
"category": "general",
"text": "A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client\u0027s intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12087",
"url": "https://www.suse.com/security/cve/CVE-2024-12087"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12087",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234103 for CVE-2024-12087",
"url": "https://bugzilla.suse.com/1234103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "important"
}
],
"title": "CVE-2024-12087"
},
{
"cve": "CVE-2024-12088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12088"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12088",
"url": "https://www.suse.com/security/cve/CVE-2024-12088"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12088",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234104 for CVE-2024-12088",
"url": "https://bugzilla.suse.com/1234104"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-12088"
},
{
"cve": "CVE-2024-12747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12747"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in rsync. This vulnerability arises from a race condition during rsync\u0027s handling of symbolic links. Rsync\u0027s default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12747",
"url": "https://www.suse.com/security/cve/CVE-2024-12747"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12747",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1235475 for CVE-2024-12747",
"url": "https://bugzilla.suse.com/1235475"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-12747"
},
{
"cve": "CVE-2025-10158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-10158"
}
],
"notes": [
{
"category": "general",
"text": "A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The \n\nmalicious \n\nrsync client requires at least read access to the remote rsync module in order to trigger the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-10158",
"url": "https://www.suse.com/security/cve/CVE-2025-10158"
},
{
"category": "external",
"summary": "SUSE Bug 1254441 for CVE-2025-10158",
"url": "https://bugzilla.suse.com/1254441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-10158"
},
{
"cve": "CVE-2026-29518",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-29518"
}
],
"notes": [
{
"category": "general",
"text": "Rsync versions before 3.4.3 contain a time-of-check to time-of-use (TOCTOU) race condition in daemon file handling that allows attackers to redirect file writes outside intended directories by replacing parent directory components with symbolic links. Attackers with write access to a module path can exploit this race condition to create or overwrite arbitrary files, potentially modifying sensitive system files and achieving privilege escalation when the daemon runs with elevated privileges. This vulnerability can only be triggered if the chroot setting is false.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-29518",
"url": "https://www.suse.com/security/cve/CVE-2026-29518"
},
{
"category": "external",
"summary": "SUSE Bug 1264511 for CVE-2026-29518",
"url": "https://bugzilla.suse.com/1264511"
},
{
"category": "external",
"summary": "SUSE Bug 1264514 for CVE-2026-29518",
"url": "https://bugzilla.suse.com/1264514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "important"
}
],
"title": "CVE-2026-29518"
},
{
"cve": "CVE-2026-41035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-41035"
}
],
"notes": [
{
"category": "general",
"text": "In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-41035",
"url": "https://www.suse.com/security/cve/CVE-2026-41035"
},
{
"category": "external",
"summary": "SUSE Bug 1262223 for CVE-2026-41035",
"url": "https://bugzilla.suse.com/1262223"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "important"
}
],
"title": "CVE-2026-41035"
},
{
"cve": "CVE-2026-43617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43617"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain an authorization bypass vulnerability in the rsync daemon\u0027s hostname-based access control list enforcement when configured with chroot. Attackers can bypass hostname-based deny rules by controlling the PTR record for their source IP address, allowing connections from hostnames that administrators intended to deny when reverse DNS resolution fails and defaults to UNKNOWN.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43617",
"url": "https://www.suse.com/security/cve/CVE-2026-43617"
},
{
"category": "external",
"summary": "SUSE Bug 1264515 for CVE-2026-43617",
"url": "https://bugzilla.suse.com/1264515"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2026-43617"
},
{
"cve": "CVE-2026-43618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43618"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain an integer overflow vulnerability in the compressed-token decoder where a 32-bit signed counter is not checked for overflow, allowing a malicious sender to trigger an overflow that causes the receiver process to read and return data from outside the intended buffer bounds. Attackers can exploit this vulnerability to disclose process memory contents including environment variables, passwords, heap and stack data, and library memory pointers, significantly reducing ASLR effectiveness and facilitating further exploitation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43618",
"url": "https://www.suse.com/security/cve/CVE-2026-43618"
},
{
"category": "external",
"summary": "SUSE Bug 1264512 for CVE-2026-43618",
"url": "https://bugzilla.suse.com/1264512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "important"
}
],
"title": "CVE-2026-43618"
},
{
"cve": "CVE-2026-43619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43619"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain symlink race condition vulnerabilities in path-based system calls including chmod, lchown, utimes, rename, unlink, mkdir, symlink, mknod, link, rmdir, and lstat that allow local attackers to redirect operations to files outside the exported rsync module. Attackers with local filesystem access can exploit the timing window between path resolution and syscall execution by swapping symlinks to apply sender-supplied permissions, ownership, timestamps, or filenames to arbitrary files outside the intended module boundary on rsync daemons configured with \u0027use chroot = no\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43619",
"url": "https://www.suse.com/security/cve/CVE-2026-43619"
},
{
"category": "external",
"summary": "SUSE Bug 1264514 for CVE-2026-43619",
"url": "https://bugzilla.suse.com/1264514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2026-43619"
},
{
"cve": "CVE-2026-43620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43620"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain a receiver-side out-of-bounds array read vulnerability in recv_files() in receiver.c that allows a malicious rsync server to crash the rsync client process. Attackers can exploit the vulnerability by setting CF_INC_RECURSE in compatibility flags and sending a specially crafted file list where the first sorted entry is not the leading dot directory, followed by a transfer record with ndx=0 and an iflag word without ITEM_TRANSFER, causing the receiver to read 8 bytes before the allocated pointer array and dereference an invalid pointer at an unmapped address, resulting in a deterministic SIGSEGV crash of the rsync client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43620",
"url": "https://www.suse.com/security/cve/CVE-2026-43620"
},
{
"category": "external",
"summary": "SUSE Bug 1264513 for CVE-2026-43620",
"url": "https://bugzilla.suse.com/1264513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2026-43620"
},
{
"cve": "CVE-2026-45232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-45232"
}
],
"notes": [
{
"category": "general",
"text": "Rsync versions before 3.4.3 contain an off-by-one out-of-bounds stack write vulnerability in the establish_proxy_connection() function in socket.c that allows network attackers to corrupt stack memory by sending a malformed HTTP proxy response. Attackers can exploit this by positioning themselves between the client and proxy or controlling the proxy server to send a response line of 1023 or more bytes without a newline terminator, causing a null byte to be written to an out-of-bounds stack address when the RSYNC_PROXY environment variable is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-45232",
"url": "https://www.suse.com/security/cve/CVE-2026-45232"
},
{
"category": "external",
"summary": "SUSE Bug 1265296 for CVE-2026-45232",
"url": "https://bugzilla.suse.com/1265296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2026-45232"
}
]
}
SUSE-SU-2026:21726-1
Vulnerability from csaf_suse - Published: 2026-05-21 11:04 - Updated: 2026-05-21 11:04Summary
Security update for rsync
Severity
Important
Notes
Title of the patch: Security update for rsync
Description of the patch: This update for rsync fixes the following issues
Security issues:
- CVE-2026-29518: Symlink-Race TOCTOU in Daemon (bsc#1264511).
- CVE-2026-43617: Authorization Bypass via Hostname Resolution (bsc#1264515).
- CVE-2026-43618: Integer Overflow Information Disclosure (bsc#1264512).
- CVE-2026-43619: Symlink Race Condition via Path-Based Syscalls (bsc#1264514).
- CVE-2026-43620: Out-of-Bounds Array Read via recv_files() (bsc#1264513).
- CVE-2026-45232: Off-by-one stack OOB write in HTTP CONNECT proxy response parsing (bsc#1265296).
Non security issues:
- rsync --delay-updates never updates after interruption (bsc#1204538).
- Fix duplication of flag causing illegal hashkey failures.
Patchnames: SUSE-SLE-Micro-6.0-720
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
8.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
9.8 (Critical)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
5.3 (Medium)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
6.5 (Medium)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.3 (Medium)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.2 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.8 (Medium)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.1 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
6.3 (Medium)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.2 (Medium)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
80 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rsync",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rsync fixes the following issues\n\nSecurity issues:\n\n- CVE-2026-29518: Symlink-Race TOCTOU in Daemon (bsc#1264511).\n- CVE-2026-43617: Authorization Bypass via Hostname Resolution (bsc#1264515).\n- CVE-2026-43618: Integer Overflow Information Disclosure (bsc#1264512).\n- CVE-2026-43619: Symlink Race Condition via Path-Based Syscalls (bsc#1264514).\n- CVE-2026-43620: Out-of-Bounds Array Read via recv_files() (bsc#1264513).\n- CVE-2026-45232: Off-by-one stack OOB write in HTTP CONNECT proxy response parsing (bsc#1265296).\n\nNon security issues:\n\n- rsync --delay-updates never updates after interruption (bsc#1204538).\n- Fix duplication of flag causing illegal hashkey failures.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-720",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21726-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21726-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621726-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21726-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046691.html"
},
{
"category": "self",
"summary": "SUSE Bug 1201840",
"url": "https://bugzilla.suse.com/1201840"
},
{
"category": "self",
"summary": "SUSE Bug 1202970",
"url": "https://bugzilla.suse.com/1202970"
},
{
"category": "self",
"summary": "SUSE Bug 1204538",
"url": "https://bugzilla.suse.com/1204538"
},
{
"category": "self",
"summary": "SUSE Bug 1234100",
"url": "https://bugzilla.suse.com/1234100"
},
{
"category": "self",
"summary": "SUSE Bug 1234101",
"url": "https://bugzilla.suse.com/1234101"
},
{
"category": "self",
"summary": "SUSE Bug 1234102",
"url": "https://bugzilla.suse.com/1234102"
},
{
"category": "self",
"summary": "SUSE Bug 1234103",
"url": "https://bugzilla.suse.com/1234103"
},
{
"category": "self",
"summary": "SUSE Bug 1234104",
"url": "https://bugzilla.suse.com/1234104"
},
{
"category": "self",
"summary": "SUSE Bug 1235475",
"url": "https://bugzilla.suse.com/1235475"
},
{
"category": "self",
"summary": "SUSE Bug 1254441",
"url": "https://bugzilla.suse.com/1254441"
},
{
"category": "self",
"summary": "SUSE Bug 1262223",
"url": "https://bugzilla.suse.com/1262223"
},
{
"category": "self",
"summary": "SUSE Bug 1264511",
"url": "https://bugzilla.suse.com/1264511"
},
{
"category": "self",
"summary": "SUSE Bug 1264512",
"url": "https://bugzilla.suse.com/1264512"
},
{
"category": "self",
"summary": "SUSE Bug 1264513",
"url": "https://bugzilla.suse.com/1264513"
},
{
"category": "self",
"summary": "SUSE Bug 1264514",
"url": "https://bugzilla.suse.com/1264514"
},
{
"category": "self",
"summary": "SUSE Bug 1264515",
"url": "https://bugzilla.suse.com/1264515"
},
{
"category": "self",
"summary": "SUSE Bug 1265296",
"url": "https://bugzilla.suse.com/1265296"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29154 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12084 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12085 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12086 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12087 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12088 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12747 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-10158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-10158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-29518 page",
"url": "https://www.suse.com/security/cve/CVE-2026-29518/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-41035 page",
"url": "https://www.suse.com/security/cve/CVE-2026-41035/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43617 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43618 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43619 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43620 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-45232 page",
"url": "https://www.suse.com/security/cve/CVE-2026-45232/"
}
],
"title": "Security update for rsync",
"tracking": {
"current_release_date": "2026-05-21T11:04:19Z",
"generator": {
"date": "2026-05-21T11:04:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21726-1",
"initial_release_date": "2026-05-21T11:04:19Z",
"revision_history": [
{
"date": "2026-05-21T11:04:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-7.1.aarch64",
"product": {
"name": "rsync-3.2.7-7.1.aarch64",
"product_id": "rsync-3.2.7-7.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-7.1.s390x",
"product": {
"name": "rsync-3.2.7-7.1.s390x",
"product_id": "rsync-3.2.7-7.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-7.1.x86_64",
"product": {
"name": "rsync-3.2.7-7.1.x86_64",
"product_id": "rsync-3.2.7-7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-7.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64"
},
"product_reference": "rsync-3.2.7-7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-7.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x"
},
"product_reference": "rsync-3.2.7-7.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-7.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
},
"product_reference": "rsync-3.2.7-7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-29154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29154"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29154",
"url": "https://www.suse.com/security/cve/CVE-2022-29154"
},
{
"category": "external",
"summary": "SUSE Bug 1201840 for CVE-2022-29154",
"url": "https://bugzilla.suse.com/1201840"
},
{
"category": "external",
"summary": "SUSE Bug 1202970 for CVE-2022-29154",
"url": "https://bugzilla.suse.com/1202970"
},
{
"category": "external",
"summary": "SUSE Bug 1202998 for CVE-2022-29154",
"url": "https://bugzilla.suse.com/1202998"
},
{
"category": "external",
"summary": "SUSE Bug 1203401 for CVE-2022-29154",
"url": "https://bugzilla.suse.com/1203401"
},
{
"category": "external",
"summary": "SUSE Bug 1203727 for CVE-2022-29154",
"url": "https://bugzilla.suse.com/1203727"
},
{
"category": "external",
"summary": "SUSE Bug 1203789 for CVE-2022-29154",
"url": "https://bugzilla.suse.com/1203789"
},
{
"category": "external",
"summary": "SUSE Bug 1204119 for CVE-2022-29154",
"url": "https://bugzilla.suse.com/1204119"
},
{
"category": "external",
"summary": "SUSE Bug 1205072 for CVE-2022-29154",
"url": "https://bugzilla.suse.com/1205072"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "important"
}
],
"title": "CVE-2022-29154"
},
{
"cve": "CVE-2024-12084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12084"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12084",
"url": "https://www.suse.com/security/cve/CVE-2024-12084"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12084",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234100 for CVE-2024-12084",
"url": "https://bugzilla.suse.com/1234100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "critical"
}
],
"title": "CVE-2024-12084"
},
{
"cve": "CVE-2024-12085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12085"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12085",
"url": "https://www.suse.com/security/cve/CVE-2024-12085"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12085",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234101 for CVE-2024-12085",
"url": "https://bugzilla.suse.com/1234101"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "moderate"
}
],
"title": "CVE-2024-12085"
},
{
"cve": "CVE-2024-12086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12086"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client\u0027s machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12086",
"url": "https://www.suse.com/security/cve/CVE-2024-12086"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12086",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234102 for CVE-2024-12086",
"url": "https://bugzilla.suse.com/1234102"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "moderate"
}
],
"title": "CVE-2024-12086"
},
{
"cve": "CVE-2024-12087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12087"
}
],
"notes": [
{
"category": "general",
"text": "A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client\u0027s intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12087",
"url": "https://www.suse.com/security/cve/CVE-2024-12087"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12087",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234103 for CVE-2024-12087",
"url": "https://bugzilla.suse.com/1234103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "important"
}
],
"title": "CVE-2024-12087"
},
{
"cve": "CVE-2024-12088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12088"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12088",
"url": "https://www.suse.com/security/cve/CVE-2024-12088"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12088",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234104 for CVE-2024-12088",
"url": "https://bugzilla.suse.com/1234104"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "moderate"
}
],
"title": "CVE-2024-12088"
},
{
"cve": "CVE-2024-12747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12747"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in rsync. This vulnerability arises from a race condition during rsync\u0027s handling of symbolic links. Rsync\u0027s default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12747",
"url": "https://www.suse.com/security/cve/CVE-2024-12747"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12747",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1235475 for CVE-2024-12747",
"url": "https://bugzilla.suse.com/1235475"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "moderate"
}
],
"title": "CVE-2024-12747"
},
{
"cve": "CVE-2025-10158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-10158"
}
],
"notes": [
{
"category": "general",
"text": "A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The \n\nmalicious \n\nrsync client requires at least read access to the remote rsync module in order to trigger the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-10158",
"url": "https://www.suse.com/security/cve/CVE-2025-10158"
},
{
"category": "external",
"summary": "SUSE Bug 1254441 for CVE-2025-10158",
"url": "https://bugzilla.suse.com/1254441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "moderate"
}
],
"title": "CVE-2025-10158"
},
{
"cve": "CVE-2026-29518",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-29518"
}
],
"notes": [
{
"category": "general",
"text": "Rsync versions before 3.4.3 contain a time-of-check to time-of-use (TOCTOU) race condition in daemon file handling that allows attackers to redirect file writes outside intended directories by replacing parent directory components with symbolic links. Attackers with write access to a module path can exploit this race condition to create or overwrite arbitrary files, potentially modifying sensitive system files and achieving privilege escalation when the daemon runs with elevated privileges. This vulnerability can only be triggered if the chroot setting is false.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-29518",
"url": "https://www.suse.com/security/cve/CVE-2026-29518"
},
{
"category": "external",
"summary": "SUSE Bug 1264511 for CVE-2026-29518",
"url": "https://bugzilla.suse.com/1264511"
},
{
"category": "external",
"summary": "SUSE Bug 1264514 for CVE-2026-29518",
"url": "https://bugzilla.suse.com/1264514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "important"
}
],
"title": "CVE-2026-29518"
},
{
"cve": "CVE-2026-41035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-41035"
}
],
"notes": [
{
"category": "general",
"text": "In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-41035",
"url": "https://www.suse.com/security/cve/CVE-2026-41035"
},
{
"category": "external",
"summary": "SUSE Bug 1262223 for CVE-2026-41035",
"url": "https://bugzilla.suse.com/1262223"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "important"
}
],
"title": "CVE-2026-41035"
},
{
"cve": "CVE-2026-43617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43617"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain an authorization bypass vulnerability in the rsync daemon\u0027s hostname-based access control list enforcement when configured with chroot. Attackers can bypass hostname-based deny rules by controlling the PTR record for their source IP address, allowing connections from hostnames that administrators intended to deny when reverse DNS resolution fails and defaults to UNKNOWN.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43617",
"url": "https://www.suse.com/security/cve/CVE-2026-43617"
},
{
"category": "external",
"summary": "SUSE Bug 1264515 for CVE-2026-43617",
"url": "https://bugzilla.suse.com/1264515"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "moderate"
}
],
"title": "CVE-2026-43617"
},
{
"cve": "CVE-2026-43618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43618"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain an integer overflow vulnerability in the compressed-token decoder where a 32-bit signed counter is not checked for overflow, allowing a malicious sender to trigger an overflow that causes the receiver process to read and return data from outside the intended buffer bounds. Attackers can exploit this vulnerability to disclose process memory contents including environment variables, passwords, heap and stack data, and library memory pointers, significantly reducing ASLR effectiveness and facilitating further exploitation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43618",
"url": "https://www.suse.com/security/cve/CVE-2026-43618"
},
{
"category": "external",
"summary": "SUSE Bug 1264512 for CVE-2026-43618",
"url": "https://bugzilla.suse.com/1264512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "important"
}
],
"title": "CVE-2026-43618"
},
{
"cve": "CVE-2026-43619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43619"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain symlink race condition vulnerabilities in path-based system calls including chmod, lchown, utimes, rename, unlink, mkdir, symlink, mknod, link, rmdir, and lstat that allow local attackers to redirect operations to files outside the exported rsync module. Attackers with local filesystem access can exploit the timing window between path resolution and syscall execution by swapping symlinks to apply sender-supplied permissions, ownership, timestamps, or filenames to arbitrary files outside the intended module boundary on rsync daemons configured with \u0027use chroot = no\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43619",
"url": "https://www.suse.com/security/cve/CVE-2026-43619"
},
{
"category": "external",
"summary": "SUSE Bug 1264514 for CVE-2026-43619",
"url": "https://bugzilla.suse.com/1264514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "moderate"
}
],
"title": "CVE-2026-43619"
},
{
"cve": "CVE-2026-43620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43620"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain a receiver-side out-of-bounds array read vulnerability in recv_files() in receiver.c that allows a malicious rsync server to crash the rsync client process. Attackers can exploit the vulnerability by setting CF_INC_RECURSE in compatibility flags and sending a specially crafted file list where the first sorted entry is not the leading dot directory, followed by a transfer record with ndx=0 and an iflag word without ITEM_TRANSFER, causing the receiver to read 8 bytes before the allocated pointer array and dereference an invalid pointer at an unmapped address, resulting in a deterministic SIGSEGV crash of the rsync client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43620",
"url": "https://www.suse.com/security/cve/CVE-2026-43620"
},
{
"category": "external",
"summary": "SUSE Bug 1264513 for CVE-2026-43620",
"url": "https://bugzilla.suse.com/1264513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "moderate"
}
],
"title": "CVE-2026-43620"
},
{
"cve": "CVE-2026-45232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-45232"
}
],
"notes": [
{
"category": "general",
"text": "Rsync versions before 3.4.3 contain an off-by-one out-of-bounds stack write vulnerability in the establish_proxy_connection() function in socket.c that allows network attackers to corrupt stack memory by sending a malformed HTTP proxy response. Attackers can exploit this by positioning themselves between the client and proxy or controlling the proxy server to send a response line of 1023 or more bytes without a newline terminator, causing a null byte to be written to an out-of-bounds stack address when the RSYNC_PROXY environment variable is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-45232",
"url": "https://www.suse.com/security/cve/CVE-2026-45232"
},
{
"category": "external",
"summary": "SUSE Bug 1265296 for CVE-2026-45232",
"url": "https://bugzilla.suse.com/1265296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:04:19Z",
"details": "moderate"
}
],
"title": "CVE-2026-45232"
}
]
}
SUSE-SU-2026:21739-1
Vulnerability from csaf_suse - Published: 2026-05-21 11:23 - Updated: 2026-05-21 11:23Summary
Security update for rsync
Severity
Important
Notes
Title of the patch: Security update for rsync
Description of the patch: This update for rsync fixes the following issues
- CVE-2026-29518: Symlink-Race TOCTOU in Daemon (bsc#1264511).
- CVE-2026-43617: Authorization Bypass via Hostname Resolution (bsc#1264515).
- CVE-2026-43618: Integer Overflow Information Disclosure (bsc#1264512).
- CVE-2026-43619: Symlink Race Condition via Path-Based Syscalls (bsc#1264514).
- CVE-2026-43620: Out-of-Bounds Array Read via recv_files() (bsc#1264513).
- CVE-2026-45232: Off-by-one stack OOB write in HTTP CONNECT proxy response parsing (bsc#1265296).
Patchnames: SUSE-SLE-Micro-6.1-539
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.2 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.8 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.1 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
6.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.2 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
References
37 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rsync",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rsync fixes the following issues\n\n- CVE-2026-29518: Symlink-Race TOCTOU in Daemon (bsc#1264511).\n- CVE-2026-43617: Authorization Bypass via Hostname Resolution (bsc#1264515).\n- CVE-2026-43618: Integer Overflow Information Disclosure (bsc#1264512).\n- CVE-2026-43619: Symlink Race Condition via Path-Based Syscalls (bsc#1264514).\n- CVE-2026-43620: Out-of-Bounds Array Read via recv_files() (bsc#1264513).\n- CVE-2026-45232: Off-by-one stack OOB write in HTTP CONNECT proxy response parsing (bsc#1265296).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-539",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21739-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21739-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621739-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21739-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046709.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254441",
"url": "https://bugzilla.suse.com/1254441"
},
{
"category": "self",
"summary": "SUSE Bug 1262223",
"url": "https://bugzilla.suse.com/1262223"
},
{
"category": "self",
"summary": "SUSE Bug 1264511",
"url": "https://bugzilla.suse.com/1264511"
},
{
"category": "self",
"summary": "SUSE Bug 1264512",
"url": "https://bugzilla.suse.com/1264512"
},
{
"category": "self",
"summary": "SUSE Bug 1264513",
"url": "https://bugzilla.suse.com/1264513"
},
{
"category": "self",
"summary": "SUSE Bug 1264514",
"url": "https://bugzilla.suse.com/1264514"
},
{
"category": "self",
"summary": "SUSE Bug 1264515",
"url": "https://bugzilla.suse.com/1264515"
},
{
"category": "self",
"summary": "SUSE Bug 1265296",
"url": "https://bugzilla.suse.com/1265296"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-10158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-10158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-29518 page",
"url": "https://www.suse.com/security/cve/CVE-2026-29518/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-41035 page",
"url": "https://www.suse.com/security/cve/CVE-2026-41035/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43617 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43618 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43619 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43620 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-45232 page",
"url": "https://www.suse.com/security/cve/CVE-2026-45232/"
}
],
"title": "Security update for rsync",
"tracking": {
"current_release_date": "2026-05-21T11:23:33Z",
"generator": {
"date": "2026-05-21T11:23:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21739-1",
"initial_release_date": "2026-05-21T11:23:33Z",
"revision_history": [
{
"date": "2026-05-21T11:23:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.3.0-slfo.1.1_6.1.aarch64",
"product": {
"name": "rsync-3.3.0-slfo.1.1_6.1.aarch64",
"product_id": "rsync-3.3.0-slfo.1.1_6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"product": {
"name": "rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"product_id": "rsync-3.3.0-slfo.1.1_6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.3.0-slfo.1.1_6.1.s390x",
"product": {
"name": "rsync-3.3.0-slfo.1.1_6.1.s390x",
"product_id": "rsync-3.3.0-slfo.1.1_6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.3.0-slfo.1.1_6.1.x86_64",
"product": {
"name": "rsync-3.3.0-slfo.1.1_6.1.x86_64",
"product_id": "rsync-3.3.0-slfo.1.1_6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.3.0-slfo.1.1_6.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64"
},
"product_reference": "rsync-3.3.0-slfo.1.1_6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.3.0-slfo.1.1_6.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le"
},
"product_reference": "rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.3.0-slfo.1.1_6.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x"
},
"product_reference": "rsync-3.3.0-slfo.1.1_6.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.3.0-slfo.1.1_6.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
},
"product_reference": "rsync-3.3.0-slfo.1.1_6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-10158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-10158"
}
],
"notes": [
{
"category": "general",
"text": "A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The \n\nmalicious \n\nrsync client requires at least read access to the remote rsync module in order to trigger the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-10158",
"url": "https://www.suse.com/security/cve/CVE-2025-10158"
},
{
"category": "external",
"summary": "SUSE Bug 1254441 for CVE-2025-10158",
"url": "https://bugzilla.suse.com/1254441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:23:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-10158"
},
{
"cve": "CVE-2026-29518",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-29518"
}
],
"notes": [
{
"category": "general",
"text": "Rsync versions before 3.4.3 contain a time-of-check to time-of-use (TOCTOU) race condition in daemon file handling that allows attackers to redirect file writes outside intended directories by replacing parent directory components with symbolic links. Attackers with write access to a module path can exploit this race condition to create or overwrite arbitrary files, potentially modifying sensitive system files and achieving privilege escalation when the daemon runs with elevated privileges. This vulnerability can only be triggered if the chroot setting is false.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-29518",
"url": "https://www.suse.com/security/cve/CVE-2026-29518"
},
{
"category": "external",
"summary": "SUSE Bug 1264511 for CVE-2026-29518",
"url": "https://bugzilla.suse.com/1264511"
},
{
"category": "external",
"summary": "SUSE Bug 1264514 for CVE-2026-29518",
"url": "https://bugzilla.suse.com/1264514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:23:33Z",
"details": "important"
}
],
"title": "CVE-2026-29518"
},
{
"cve": "CVE-2026-41035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-41035"
}
],
"notes": [
{
"category": "general",
"text": "In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-41035",
"url": "https://www.suse.com/security/cve/CVE-2026-41035"
},
{
"category": "external",
"summary": "SUSE Bug 1262223 for CVE-2026-41035",
"url": "https://bugzilla.suse.com/1262223"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:23:33Z",
"details": "important"
}
],
"title": "CVE-2026-41035"
},
{
"cve": "CVE-2026-43617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43617"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain an authorization bypass vulnerability in the rsync daemon\u0027s hostname-based access control list enforcement when configured with chroot. Attackers can bypass hostname-based deny rules by controlling the PTR record for their source IP address, allowing connections from hostnames that administrators intended to deny when reverse DNS resolution fails and defaults to UNKNOWN.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43617",
"url": "https://www.suse.com/security/cve/CVE-2026-43617"
},
{
"category": "external",
"summary": "SUSE Bug 1264515 for CVE-2026-43617",
"url": "https://bugzilla.suse.com/1264515"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:23:33Z",
"details": "moderate"
}
],
"title": "CVE-2026-43617"
},
{
"cve": "CVE-2026-43618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43618"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain an integer overflow vulnerability in the compressed-token decoder where a 32-bit signed counter is not checked for overflow, allowing a malicious sender to trigger an overflow that causes the receiver process to read and return data from outside the intended buffer bounds. Attackers can exploit this vulnerability to disclose process memory contents including environment variables, passwords, heap and stack data, and library memory pointers, significantly reducing ASLR effectiveness and facilitating further exploitation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43618",
"url": "https://www.suse.com/security/cve/CVE-2026-43618"
},
{
"category": "external",
"summary": "SUSE Bug 1264512 for CVE-2026-43618",
"url": "https://bugzilla.suse.com/1264512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:23:33Z",
"details": "important"
}
],
"title": "CVE-2026-43618"
},
{
"cve": "CVE-2026-43619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43619"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain symlink race condition vulnerabilities in path-based system calls including chmod, lchown, utimes, rename, unlink, mkdir, symlink, mknod, link, rmdir, and lstat that allow local attackers to redirect operations to files outside the exported rsync module. Attackers with local filesystem access can exploit the timing window between path resolution and syscall execution by swapping symlinks to apply sender-supplied permissions, ownership, timestamps, or filenames to arbitrary files outside the intended module boundary on rsync daemons configured with \u0027use chroot = no\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43619",
"url": "https://www.suse.com/security/cve/CVE-2026-43619"
},
{
"category": "external",
"summary": "SUSE Bug 1264514 for CVE-2026-43619",
"url": "https://bugzilla.suse.com/1264514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:23:33Z",
"details": "moderate"
}
],
"title": "CVE-2026-43619"
},
{
"cve": "CVE-2026-43620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43620"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain a receiver-side out-of-bounds array read vulnerability in recv_files() in receiver.c that allows a malicious rsync server to crash the rsync client process. Attackers can exploit the vulnerability by setting CF_INC_RECURSE in compatibility flags and sending a specially crafted file list where the first sorted entry is not the leading dot directory, followed by a transfer record with ndx=0 and an iflag word without ITEM_TRANSFER, causing the receiver to read 8 bytes before the allocated pointer array and dereference an invalid pointer at an unmapped address, resulting in a deterministic SIGSEGV crash of the rsync client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43620",
"url": "https://www.suse.com/security/cve/CVE-2026-43620"
},
{
"category": "external",
"summary": "SUSE Bug 1264513 for CVE-2026-43620",
"url": "https://bugzilla.suse.com/1264513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:23:33Z",
"details": "moderate"
}
],
"title": "CVE-2026-43620"
},
{
"cve": "CVE-2026-45232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-45232"
}
],
"notes": [
{
"category": "general",
"text": "Rsync versions before 3.4.3 contain an off-by-one out-of-bounds stack write vulnerability in the establish_proxy_connection() function in socket.c that allows network attackers to corrupt stack memory by sending a malformed HTTP proxy response. Attackers can exploit this by positioning themselves between the client and proxy or controlling the proxy server to send a response line of 1023 or more bytes without a newline terminator, causing a null byte to be written to an out-of-bounds stack address when the RSYNC_PROXY environment variable is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-45232",
"url": "https://www.suse.com/security/cve/CVE-2026-45232"
},
{
"category": "external",
"summary": "SUSE Bug 1265296 for CVE-2026-45232",
"url": "https://bugzilla.suse.com/1265296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.aarch64",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.ppc64le",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.s390x",
"SUSE Linux Micro 6.1:rsync-3.3.0-slfo.1.1_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T11:23:33Z",
"details": "moderate"
}
],
"title": "CVE-2026-45232"
}
]
}
WID-SEC-W-2026-1611
Vulnerability from csaf_certbund - Published: 2026-05-19 22:00 - Updated: 2026-05-20 22:00Summary
Rsync: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Rsync ist ein Tool, um Dateien und Verzeichnisse zu synchronisieren.
Angriff: Ein Angreifer kann mehrere Schwachstellen in Rsync ausnutzen, um seine Privilegien zu erhöhen, um Informationen offenzulegen, um Sicherheitsvorkehrungen zu umgehen, und um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme: - Linux
- UNIX
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source Rsync <3.4.3
Open Source / Rsync
|
<3.4.3 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source Rsync <3.4.3
Open Source / Rsync
|
<3.4.3 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source Rsync <3.4.3
Open Source / Rsync
|
<3.4.3 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source Rsync <3.4.3
Open Source / Rsync
|
<3.4.3 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source Rsync <3.4.3
Open Source / Rsync
|
<3.4.3 |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source Rsync <3.4.3
Open Source / Rsync
|
<3.4.3 |
References
10 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Rsync ist ein Tool, um Dateien und Verzeichnisse zu synchronisieren.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Rsync ausnutzen, um seine Privilegien zu erh\u00f6hen, um Informationen offenzulegen, um Sicherheitsvorkehrungen zu umgehen, und um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1611 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1611.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1611 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1611"
},
{
"category": "external",
"summary": "rsync Release Notes 3.4.3 vom 2026-05-19",
"url": "https://download.samba.org/pub/rsync/NEWS.html"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-RJFM-3W2M-JF4F vom 2026-05-19",
"url": "https://github.com/RsyncProject/rsync/security/advisories/GHSA-RJFM-3W2M-JF4F"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-88m5-cm5m-2596 vom 2026-05-19",
"url": "https://github.com/RsyncProject/rsync/security/advisories/GHSA-88m5-cm5m-2596"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-4h9m-w5ff-j735 vom 2026-05-19",
"url": "https://github.com/RsyncProject/rsync/security/advisories/GHSA-4h9m-w5ff-j735"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-28pw-r563-rxvm vom 2026-05-19",
"url": "https://github.com/RsyncProject/rsync/security/advisories/GHSA-28pw-r563-rxvm"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8283-1 vom 2026-05-20",
"url": "https://ubuntu.com/security/notices/USN-8283-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6282 vom 2026-05-20",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00193.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4591 vom 2026-05-20",
"url": "https://lists.debian.org/debian-lts-announce/2026/05/msg00036.html"
}
],
"source_lang": "en-US",
"title": "Rsync: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-05-20T22:00:00.000+00:00",
"generator": {
"date": "2026-05-21T07:35:45.920+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.6.0"
}
},
"id": "WID-SEC-W-2026-1611",
"initial_release_date": "2026-05-19T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-05-19T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-05-20T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu, European Union Vulnerability Database und Debian aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.4.3",
"product": {
"name": "Open Source Rsync \u003c3.4.3",
"product_id": "T054400"
}
},
{
"category": "product_version",
"name": "3.4.3",
"product": {
"name": "Open Source Rsync 3.4.3",
"product_id": "T054400-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:gnu:rsync:3.4.3"
}
}
}
],
"category": "product_name",
"name": "Rsync"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-29518",
"product_status": {
"known_affected": [
"2951",
"T000126",
"T054400"
]
},
"release_date": "2026-05-19T22:00:00.000+00:00",
"title": "CVE-2026-29518"
},
{
"cve": "CVE-2026-43617",
"product_status": {
"known_affected": [
"2951",
"T000126",
"T054400"
]
},
"release_date": "2026-05-19T22:00:00.000+00:00",
"title": "CVE-2026-43617"
},
{
"cve": "CVE-2026-43618",
"product_status": {
"known_affected": [
"2951",
"T000126",
"T054400"
]
},
"release_date": "2026-05-19T22:00:00.000+00:00",
"title": "CVE-2026-43618"
},
{
"cve": "CVE-2026-43619",
"product_status": {
"known_affected": [
"2951",
"T000126",
"T054400"
]
},
"release_date": "2026-05-19T22:00:00.000+00:00",
"title": "CVE-2026-43619"
},
{
"cve": "CVE-2026-43620",
"product_status": {
"known_affected": [
"2951",
"T000126",
"T054400"
]
},
"release_date": "2026-05-19T22:00:00.000+00:00",
"title": "CVE-2026-43620"
},
{
"cve": "CVE-2026-45232",
"product_status": {
"known_affected": [
"2951",
"T000126",
"T054400"
]
},
"release_date": "2026-05-19T22:00:00.000+00:00",
"title": "CVE-2026-45232"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…