PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-29518 RsyncProject CVE debrief

CVE-2026-29518 affects rsync versions before 3.4.3. The issue is a time-of-check to time-of-use race in daemon file handling that can let an attacker redirect writes outside the intended directory by swapping parent path components with symbolic links. In the conditions described, an attacker with write access to a module path could create or overwrite arbitrary files, which may lead to sensitive file modification and privilege escalation if the daemon runs with elevated privileges. The issue only applies when chroot is false.

Vendor
RsyncProject
Product
rsync
CVSS
HIGH 7.3
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-20
Original CVE updated
2026-05-21
Advisory published
2026-05-20
Advisory updated
2026-05-21

Who should care

Administrators and security teams running rsync daemon deployments, especially any setup that allows write access to a module path and does not use chroot. Systems where the daemon runs with elevated privileges should be treated as higher risk.

Technical summary

The corpus describes a TOCTOU race in rsync daemon file handling. Because path validation and file-use are separated, an attacker who can write to a module path may replace parent directory components with symbolic links between check and use, redirecting writes to attacker-chosen locations outside the intended tree. The issue is identified with CWE-367 and is limited to configurations where chroot is false. The linked upstream release is v3.4.3, which is the referenced fixed version in the corpus.

Defensive priority

High

Recommended defensive actions

  • Upgrade rsync to 3.4.3 or later.
  • If feasible, run the daemon with chroot enabled; the reported issue only triggers when chroot is false.
  • Review rsync module permissions and remove write access where not strictly required.
  • Run the daemon with the least privilege practical for the deployment.
  • Audit systems for unexpected file writes or configuration changes in locations writable through rsync modules.

Evidence notes

The supplied corpus includes an NVD record for CVE-2026-29518 marked 'Undergoing Analysis' and a CWE-367 classification. Reference links point to a Vulncheck advisory, a GitHub rsync pull request/changeset, and the rsync v3.4.3 release tag. The CVE timing used here follows the provided publishedAt/modifiedAt fields on 2026-05-20. The corpus metadata is inconsistent about vendor naming: it lists 'Unknown Vendor' while the linked references clearly point to RsyncProject/rsync.

Official resources

Public disclosure in the supplied corpus is anchored by the Vulncheck advisory and the linked upstream rsync v3.4.3 release, with the CVE published on 2026-05-20.