CVE-2026-43619

Publication date 20 May 2026

Last updated 21 May 2026


Ubuntu priority

Cvss 3 Severity Score

6.3 · Medium

Score breakdown

Description

Rsync versionĀ 3.4.2 and prior contain symlink race condition vulnerabilities in path-based system calls including chmod, lchown, utimes, rename, unlink, mkdir, symlink, mknod, link, rmdir, and lstat that allow local attackers to redirect operations to files outside the exported rsync module. Attackers with local filesystem access can exploit the timing window between path resolution and syscall execution by swapping symlinks to apply sender-supplied permissions, ownership, timestamps, or filenames to arbitrary files outside the intended module boundary on rsync daemons configured with 'use chroot = no'.

Status

Package Ubuntu Release Status
rsync 26.04 LTS resolute
Fixed 3.4.1+ds1-7ubuntu0.2
25.10 questing
Fixed 3.4.1+ds1-5ubuntu1.2
24.04 LTS noble
Fixed 3.2.7-1ubuntu1.4
22.04 LTS jammy
Fixed 3.2.7-0ubuntu0.22.04.6
20.04 LTS focal
Needs evaluation
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
14.04 LTS trusty
Needs evaluation

Severity score breakdown

Parameter Value
Base score 6.3 · Medium
Attack vector Local
Attack complexity High
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact None
Vector CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

References

Related Ubuntu Security Notices (USN)

Other references


Access our resources on patching vulnerabilities