Security update for rsync
| Announcement ID: | SUSE-SU-2026:21739-1 |
|---|---|
| Release Date: | 2026-05-21T11:22:07Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves eight vulnerabilities can now be installed.
Description:
This update for rsync fixes the following issues
- CVE-2026-29518: Symlink-Race TOCTOU in Daemon (bsc#1264511).
- CVE-2026-43617: Authorization Bypass via Hostname Resolution (bsc#1264515).
- CVE-2026-43618: Integer Overflow Information Disclosure (bsc#1264512).
- CVE-2026-43619: Symlink Race Condition via Path-Based Syscalls (bsc#1264514).
- CVE-2026-43620: Out-of-Bounds Array Read via recv_files() (bsc#1264513).
- CVE-2026-45232: Off-by-one stack OOB write in HTTP CONNECT proxy response parsing (bsc#1265296).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Micro 6.1
zypper in -t patch SUSE-SLE-Micro-6.1-539=1
Package List:
-
SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64)
- rsync-debugsource-3.3.0-slfo.1.1_6.1
- rsync-debuginfo-3.3.0-slfo.1.1_6.1
- rsync-3.3.0-slfo.1.1_6.1
References:
- https://www.suse.com/security/cve/CVE-2025-10158.html
- https://www.suse.com/security/cve/CVE-2026-29518.html
- https://www.suse.com/security/cve/CVE-2026-41035.html
- https://www.suse.com/security/cve/CVE-2026-43617.html
- https://www.suse.com/security/cve/CVE-2026-43618.html
- https://www.suse.com/security/cve/CVE-2026-43619.html
- https://www.suse.com/security/cve/CVE-2026-43620.html
- https://www.suse.com/security/cve/CVE-2026-45232.html
- https://bugzilla.suse.com/show_bug.cgi?id=1254441
- https://bugzilla.suse.com/show_bug.cgi?id=1262223
- https://bugzilla.suse.com/show_bug.cgi?id=1264511
- https://bugzilla.suse.com/show_bug.cgi?id=1264512
- https://bugzilla.suse.com/show_bug.cgi?id=1264513
- https://bugzilla.suse.com/show_bug.cgi?id=1264514
- https://bugzilla.suse.com/show_bug.cgi?id=1264515
- https://bugzilla.suse.com/show_bug.cgi?id=1265296