| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4591-1 | rsync security update |
Debian DSA |
DSA-6282-1 | rsync security update |
Ubuntu USN |
USN-8283-1 | rsync vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 20 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rsync Project
Rsync Project rsync |
|
| Vendors & Products |
Rsync Project
Rsync Project rsync |
Wed, 20 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rsync versionĀ 3.4.2 and prior contain an authorization bypass vulnerability in the rsync daemon's hostname-based access control list enforcement when configured with chroot. Attackers can bypass hostname-based deny rules by controlling the PTR record for their source IP address, allowing connections from hostnames that administrators intended to deny when reverse DNS resolution fails and defaults to UNKNOWN. | |
| Title | Rsync < 3.4.3 Authorization Bypass via Hostname Resolution | |
| Weaknesses | CWE-289 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-20T15:45:40.806Z
Reserved: 2026-05-01T18:22:45.639Z
Link: CVE-2026-43617
Updated: 2026-05-20T13:25:04.043Z
Status : Awaiting Analysis
Published: 2026-05-20T02:16:36.233
Modified: 2026-05-20T13:58:07.923
Link: CVE-2026-43617
No data.
OpenCVE Enrichment
Updated: 2026-05-20T10:38:37Z
Debian DLA
Debian DSA
Ubuntu USN