Rsync Vulnerability Exposes Users to Use-After-Free Flaw
The National Vulnerability Database (NVD) has detailed a critical use-after-free vulnerability affecting rsync versions 3.0.1 through 3.4.1. According to NVD, the flaw lies within the receive_xattr function, which mishandles an untrusted length value during a qsort call. This can lead to a use-after-free condition on the receiver side.
Exploitation requires the rsync command to be executed with the -X or --xattrs flag, enabling extended attributes. While many common Linux configurations are vulnerable, NVD notes that non-Linux platforms face a broader risk. The vulnerability, tracked as CVE-2026-41035, carries a CVSS score of 7.4, classifying it as HIGH severity. The underlying issue is categorized under CWE-130, which relates to buffer underflows and overflows.
What This Means For You
- If your environment is affected by CWE-130, patch immediately and audit logs for signs of exploitation. Monitor vendor advisories for CVE-2026-41035 updates and patches.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-41035 - Rsync Use-After-Free via Extended Attributes
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41035 | Use After Free | rsync versions 3.0.1 through 3.4.1 |
| CVE-2026-41035 | Use After Free | Vulnerable function: receive_xattr |
| CVE-2026-41035 | Use After Free | Attack vector: rsync with -X or --xattrs option |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 16, 2026 at 10:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.