Security update for rsync
| Announcement ID: | SUSE-SU-2026:2038-1 |
|---|---|
| Release Date: | 2026-05-21T13:33:42Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 14 vulnerabilities can now be installed.
Description:
This update for rsync fixes the following issues
- CVE-2026-29518: Symlink-Race TOCTOU in Daemon (bsc#1264511).
- CVE-2026-41035: Count of entries mismatch can lead to a use-after-free (bsc#1262223)
- CVE-2026-43617: Authorization Bypass via Hostname Resolution (bsc#1264515).
- CVE-2026-43618: Integer Overflow Information Disclosure (bsc#1264512).
- CVE-2026-43619: Symlink Race Condition via Path-Based Syscalls (bsc#1264514).
- CVE-2026-43620: Out-of-Bounds Array Read via recv_files() (bsc#1264513).
- CVE-2026-45232: Off-by-one stack OOB write in HTTP CONNECT proxy response parsing (bsc#1265296).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-2038=1 -
SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-2038=1 -
SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-2038=1 -
openSUSE Leap 15.6
zypper in -t patch SUSE-2026-2038=1
Package List:
-
Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
- rsync-3.2.7-150600.3.21.1
- rsync-debugsource-3.2.7-150600.3.21.1
- rsync-debuginfo-3.2.7-150600.3.21.1
-
SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
- rsync-3.2.7-150600.3.21.1
- rsync-debugsource-3.2.7-150600.3.21.1
- rsync-debuginfo-3.2.7-150600.3.21.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
- rsync-3.2.7-150600.3.21.1
- rsync-debugsource-3.2.7-150600.3.21.1
- rsync-debuginfo-3.2.7-150600.3.21.1
-
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
- rsync-3.2.7-150600.3.21.1
- rsync-debugsource-3.2.7-150600.3.21.1
- rsync-debuginfo-3.2.7-150600.3.21.1
References:
- https://www.suse.com/security/cve/CVE-2024-12084.html
- https://www.suse.com/security/cve/CVE-2024-12085.html
- https://www.suse.com/security/cve/CVE-2024-12086.html
- https://www.suse.com/security/cve/CVE-2024-12087.html
- https://www.suse.com/security/cve/CVE-2024-12088.html
- https://www.suse.com/security/cve/CVE-2024-12747.html
- https://www.suse.com/security/cve/CVE-2025-10158.html
- https://www.suse.com/security/cve/CVE-2026-29518.html
- https://www.suse.com/security/cve/CVE-2026-41035.html
- https://www.suse.com/security/cve/CVE-2026-43617.html
- https://www.suse.com/security/cve/CVE-2026-43618.html
- https://www.suse.com/security/cve/CVE-2026-43619.html
- https://www.suse.com/security/cve/CVE-2026-43620.html
- https://www.suse.com/security/cve/CVE-2026-45232.html
- https://bugzilla.suse.com/show_bug.cgi?id=1234100
- https://bugzilla.suse.com/show_bug.cgi?id=1234101
- https://bugzilla.suse.com/show_bug.cgi?id=1234102
- https://bugzilla.suse.com/show_bug.cgi?id=1234103
- https://bugzilla.suse.com/show_bug.cgi?id=1234104
- https://bugzilla.suse.com/show_bug.cgi?id=1235475
- https://bugzilla.suse.com/show_bug.cgi?id=1254441
- https://bugzilla.suse.com/show_bug.cgi?id=1262223
- https://bugzilla.suse.com/show_bug.cgi?id=1264511
- https://bugzilla.suse.com/show_bug.cgi?id=1264512
- https://bugzilla.suse.com/show_bug.cgi?id=1264513
- https://bugzilla.suse.com/show_bug.cgi?id=1264514
- https://bugzilla.suse.com/show_bug.cgi?id=1264515
- https://bugzilla.suse.com/show_bug.cgi?id=1265296