No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4591-1 | rsync security update |
Debian DSA |
DSA-6282-1 | rsync security update |
Ubuntu USN |
USN-8283-1 | rsync vulnerabilities |
Wed, 20 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rsync Project
Rsync Project rsync |
|
| Vendors & Products |
Rsync Project
Rsync Project rsync |
Wed, 20 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rsync version 3.4.2 and prior contain an authorization bypass vulnerability in the rsync daemon's hostname-based access control list enforcement when configured with chroot. Attackers can bypass hostname-based deny rules by controlling the PTR record for their source IP address, allowing connections from hostnames that administrators intended to deny when reverse DNS resolution fails and defaults to UNKNOWN. | |
| Title | Rsync < 3.4.3 Authorization Bypass via Hostname Resolution | |
| Weaknesses | CWE-289 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-20T15:45:40.806Z
Reserved: 2026-05-01T18:22:45.639Z
Link: CVE-2026-43617
Updated: 2026-05-20T13:25:04.043Z
Status : Awaiting Analysis
Published: 2026-05-20T02:16:36.233
Modified: 2026-05-20T13:58:07.923
Link: CVE-2026-43617
No data.
OpenCVE Enrichment
Updated: 2026-05-20T10:38:37Z
Debian DLA
Debian DSA
Ubuntu USN