Rsync versions before 3.4.3 contain a time-of-check to time-of-use (TOCTOU) race condition in daemon file handling that allows attackers to redirect file writes outside intended directories by replacing parent directory components with symbolic links. Attackers with write access to a module path can exploit this race condition to create or overwrite arbitrary files, potentially modifying sensitive system files and achieving privilege escalation when the daemon runs with elevated privileges. This vulnerability can only be triggered if the chroot setting is false.
Metrics
Affected Vendors & Products
References
History
Thu, 21 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Samba
Samba rsync |
|
| CPEs | cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Samba
Samba rsync |
Thu, 21 May 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rsync Project
Rsync Project rsync |
|
| Vendors & Products |
Rsync Project
Rsync Project rsync |
Wed, 20 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rsync versions before 3.4.3 contain a time-of-check to time-of-use (TOCTOU) race condition in daemon file handling that allows attackers to redirect file writes outside intended directories by replacing parent directory components with symbolic links. Attackers with write access to a module path can exploit this race condition to create or overwrite arbitrary files, potentially modifying sensitive system files and achieving privilege escalation when the daemon runs with elevated privileges. This vulnerability can only be triggered if the chroot setting is false. | |
| Title | Rsync < 3.4.3 TOCTOU Race Condition Allows Symlink-Based Arbitrary File Write | |
| Weaknesses | CWE-367 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-05-20T12:48:07.656Z
Updated: 2026-05-20T14:50:31.650Z
Reserved: 2026-03-04T15:39:26.872Z
Link: CVE-2026-29518
Updated: 2026-05-20T14:50:19.321Z
Status : Analyzed
Published: 2026-05-20T13:16:17.040
Modified: 2026-05-21T17:05:55.750
Link: CVE-2026-29518
No data.