๐Ÿ” CVE Alert

CVE-2026-41035

HIGH 7.4
CVSS Score
7.4
EPSS Score
0.0%
EPSS Percentile
3th

In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.

CWE CWE-130
Vendor samba
Product rsync
Published Apr 16, 2026
Last Updated Apr 16, 2026
Stay Ahead of the Next One

Get instant alerts for samba rsync

Be the first to know when new high vulnerabilities affecting samba rsync are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

Samba / rsync
3.0.1 โ‰ค 3.4.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
openwall.com: https://www.openwall.com/lists/oss-security/2026/04/16/2 github.com: https://github.com/RsyncProject/rsync/releases github.com: https://github.com/RsyncProject/rsync/issues/871 openwall.com: http://www.openwall.com/lists/oss-security/2026/04/16/9