Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 17 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Rsync xattrs Use‑After‑Free Exploit Risk | rsync: Rsync: Use-after-free vulnerability in extended attribute handling |
| Weaknesses | CWE-805 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 17 Apr 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Rsync xattrs Use‑After‑Free Exploit Risk |
Thu, 16 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 16 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable. | |
| First Time appeared |
Samba
Samba rsync |
|
| Weaknesses | CWE-130 | |
| CPEs | cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Samba
Samba rsync |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-22T03:03:52.565Z
Reserved: 2026-04-16T06:53:04.777Z
Link: CVE-2026-41035
Updated: 2026-04-22T03:03:52.565Z
Status : Awaiting Analysis
Published: 2026-04-16T07:16:31.003
Modified: 2026-04-22T04:16:04.553
Link: CVE-2026-41035
OpenCVE Enrichment
Updated: 2026-04-18T17:30:05Z