Security update for rsync
| Announcement ID: | SUSE-SU-2026:21726-1 |
|---|---|
| Release Date: | 2026-05-21T11:03:43Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 15 vulnerabilities, contains one feature and has two fixes can now be installed.
Description:
This update for rsync fixes the following issues
Security issues:
- CVE-2026-29518: Symlink-Race TOCTOU in Daemon (bsc#1264511).
- CVE-2026-43617: Authorization Bypass via Hostname Resolution (bsc#1264515).
- CVE-2026-43618: Integer Overflow Information Disclosure (bsc#1264512).
- CVE-2026-43619: Symlink Race Condition via Path-Based Syscalls (bsc#1264514).
- CVE-2026-43620: Out-of-Bounds Array Read via recv_files() (bsc#1264513).
- CVE-2026-45232: Off-by-one stack OOB write in HTTP CONNECT proxy response parsing (bsc#1265296).
Non security issues:
- rsync --delay-updates never updates after interruption (bsc#1204538).
- Fix duplication of flag causing illegal hashkey failures.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Micro 6.0
zypper in -t patch SUSE-SLE-Micro-6.0-720=1
Package List:
-
SUSE Linux Micro 6.0 (aarch64 s390x x86_64)
- rsync-debuginfo-3.2.7-7.1
- rsync-3.2.7-7.1
- rsync-debugsource-3.2.7-7.1
References:
- https://www.suse.com/security/cve/CVE-2022-29154.html
- https://www.suse.com/security/cve/CVE-2024-12084.html
- https://www.suse.com/security/cve/CVE-2024-12085.html
- https://www.suse.com/security/cve/CVE-2024-12086.html
- https://www.suse.com/security/cve/CVE-2024-12087.html
- https://www.suse.com/security/cve/CVE-2024-12088.html
- https://www.suse.com/security/cve/CVE-2024-12747.html
- https://www.suse.com/security/cve/CVE-2025-10158.html
- https://www.suse.com/security/cve/CVE-2026-29518.html
- https://www.suse.com/security/cve/CVE-2026-41035.html
- https://www.suse.com/security/cve/CVE-2026-43617.html
- https://www.suse.com/security/cve/CVE-2026-43618.html
- https://www.suse.com/security/cve/CVE-2026-43619.html
- https://www.suse.com/security/cve/CVE-2026-43620.html
- https://www.suse.com/security/cve/CVE-2026-45232.html
- https://bugzilla.suse.com/show_bug.cgi?id=1201840
- https://bugzilla.suse.com/show_bug.cgi?id=1202970
- https://bugzilla.suse.com/show_bug.cgi?id=1204538
- https://bugzilla.suse.com/show_bug.cgi?id=1234100
- https://bugzilla.suse.com/show_bug.cgi?id=1234101
- https://bugzilla.suse.com/show_bug.cgi?id=1234102
- https://bugzilla.suse.com/show_bug.cgi?id=1234103
- https://bugzilla.suse.com/show_bug.cgi?id=1234104
- https://bugzilla.suse.com/show_bug.cgi?id=1235475
- https://bugzilla.suse.com/show_bug.cgi?id=1254441
- https://bugzilla.suse.com/show_bug.cgi?id=1262223
- https://bugzilla.suse.com/show_bug.cgi?id=1264511
- https://bugzilla.suse.com/show_bug.cgi?id=1264512
- https://bugzilla.suse.com/show_bug.cgi?id=1264513
- https://bugzilla.suse.com/show_bug.cgi?id=1264514
- https://bugzilla.suse.com/show_bug.cgi?id=1264515
- https://bugzilla.suse.com/show_bug.cgi?id=1265296
- https://jira.suse.com/browse/SLE-21252