PatchSiren cyber security CVE debrief
CVE-2026-29518 RsyncProject CVE debrief
CVE-2026-29518 affects rsync versions before 3.4.3. The issue is a time-of-check to time-of-use race in daemon file handling that can let an attacker redirect writes outside the intended directory by swapping parent path components with symbolic links. In the conditions described, an attacker with write access to a module path could create or overwrite arbitrary files, which may lead to sensitive file modification and privilege escalation if the daemon runs with elevated privileges. The issue only applies when chroot is false.
- Vendor
- RsyncProject
- Product
- rsync
- CVSS
- HIGH 7.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-20
- Original CVE updated
- 2026-05-21
- Advisory published
- 2026-05-20
- Advisory updated
- 2026-05-21
Who should care
Administrators and security teams running rsync daemon deployments, especially any setup that allows write access to a module path and does not use chroot. Systems where the daemon runs with elevated privileges should be treated as higher risk.
Technical summary
The corpus describes a TOCTOU race in rsync daemon file handling. Because path validation and file-use are separated, an attacker who can write to a module path may replace parent directory components with symbolic links between check and use, redirecting writes to attacker-chosen locations outside the intended tree. The issue is identified with CWE-367 and is limited to configurations where chroot is false. The linked upstream release is v3.4.3, which is the referenced fixed version in the corpus.
Defensive priority
High
Recommended defensive actions
- Upgrade rsync to 3.4.3 or later.
- If feasible, run the daemon with chroot enabled; the reported issue only triggers when chroot is false.
- Review rsync module permissions and remove write access where not strictly required.
- Run the daemon with the least privilege practical for the deployment.
- Audit systems for unexpected file writes or configuration changes in locations writable through rsync modules.
Evidence notes
The supplied corpus includes an NVD record for CVE-2026-29518 marked 'Undergoing Analysis' and a CWE-367 classification. Reference links point to a Vulncheck advisory, a GitHub rsync pull request/changeset, and the rsync v3.4.3 release tag. The CVE timing used here follows the provided publishedAt/modifiedAt fields on 2026-05-20. The corpus metadata is inconsistent about vendor naming: it lists 'Unknown Vendor' while the linked references clearly point to RsyncProject/rsync.
Official resources
-
CVE-2026-29518 CVE record
CVE.org
-
CVE-2026-29518 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch
-
Mitigation or vendor reference
[email protected] - Release Notes
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Public disclosure in the supplied corpus is anchored by the Vulncheck advisory and the linked upstream rsync v3.4.3 release, with the CVE published on 2026-05-20.