CVE-2026-41035

NameCVE-2026-41035
DescriptionIn rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1134617

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rsync (PTS)bullseye3.2.3-4+deb11u1vulnerable
bullseye (security)3.2.3-4+deb11u3vulnerable
bookworm3.2.7-1+deb12u4vulnerable
bookworm (security)3.2.7-1+deb12u2vulnerable
trixie3.4.1+ds1-5+deb13u1vulnerable
forky, sid3.4.2+ds1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rsyncsource(unstable)3.4.2+ds1-1unimportant1134617

Notes

https://www.openwall.com/lists/oss-security/2026/04/16/2
https://github.com/RsyncProject/rsync/issues/871
https://github.com/RsyncProject/rsync/pull/875
https://github.com/RsyncProject/rsync/commit/bb0a8118c2d2ab01140bac5e4e327e5e1ef90c9c (v3.4.2)
No security impact

Search for package or bug name: Reporting problems