UBUNTU-CVE-2026-41035

Source
https://ubuntu.com/security/CVE-2026-41035
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41035.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2026-41035
Upstream
Published
2026-04-16T00:00:00Z
Modified
2026-04-27T20:17:49.420801Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.

References

Affected packages

Ubuntu:20.04:LTS
rsync

Package

Name
rsync
Purl
pkg:deb/ubuntu/rsync@3.1.3-8ubuntu0.9?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.1.3-6
3.1.3-8
3.1.3-8ubuntu0.1
3.1.3-8ubuntu0.2
3.1.3-8ubuntu0.3
3.1.3-8ubuntu0.4
3.1.3-8ubuntu0.5
3.1.3-8ubuntu0.7
3.1.3-8ubuntu0.8
3.1.3-8ubuntu0.9

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "rsync",
            "binary_version": "3.1.3-8ubuntu0.9"
        }
    ],
    "priority_reason": "Per rsync developers this has no security impact"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41035.json"
Ubuntu:22.04:LTS
rsync

Package

Name
rsync
Purl
pkg:deb/ubuntu/rsync@3.2.7-0ubuntu0.22.04.4?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.2.3-4ubuntu1
3.2.3-4ubuntu2
3.2.3-8ubuntu1
3.2.3-8ubuntu2
3.2.3-8ubuntu3
3.2.3-8ubuntu3.1
3.2.7-0ubuntu0.22.04.2
3.2.7-0ubuntu0.22.04.3
3.2.7-0ubuntu0.22.04.4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "rsync",
            "binary_version": "3.2.7-0ubuntu0.22.04.4"
        }
    ],
    "priority_reason": "Per rsync developers this has no security impact"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41035.json"
Ubuntu:24.04:LTS
rsync

Package

Name
rsync
Purl
pkg:deb/ubuntu/rsync@3.2.7-1ubuntu1.2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.2.7-1
3.2.7-1build1
3.2.7-1build2
3.2.7-1ubuntu1
3.2.7-1ubuntu1.1
3.2.7-1ubuntu1.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "rsync",
            "binary_version": "3.2.7-1ubuntu1.2"
        }
    ],
    "priority_reason": "Per rsync developers this has no security impact"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41035.json"
Ubuntu:25.10
rsync

Package

Name
rsync
Purl
pkg:deb/ubuntu/rsync@3.4.1+ds1-5ubuntu1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.4.1+ds1-3
3.4.1+ds1-4
3.4.1+ds1-5
3.4.1+ds1-5ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "rsync",
            "binary_version": "3.4.1+ds1-5ubuntu1"
        }
    ],
    "priority_reason": "Per rsync developers this has no security impact"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41035.json"
Ubuntu:26.04
rsync

Package

Name
rsync
Purl
pkg:deb/ubuntu/rsync@3.4.1+ds1-7?arch=source&distro=resolute

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.4.1+ds1-5ubuntu1
3.4.1+ds1-6
3.4.1+ds1-7

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "rsync",
            "binary_version": "3.4.1+ds1-7"
        }
    ],
    "priority_reason": "Per rsync developers this has no security impact"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41035.json"
Ubuntu:Pro:14.04:LTS
rsync

Package

Name
rsync
Purl
pkg:deb/ubuntu/rsync@3.1.0-2ubuntu0.4+esm2?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.0.9-4ubuntu1
3.1.0-2
3.1.0-2ubuntu0.1
3.1.0-2ubuntu0.2
3.1.0-2ubuntu0.3
3.1.0-2ubuntu0.4
3.1.0-2ubuntu0.4+esm1
3.1.0-2ubuntu0.4+esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "rsync",
            "binary_version": "3.1.0-2ubuntu0.4+esm2"
        }
    ],
    "priority_reason": "Per rsync developers this has no security impact"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41035.json"
Ubuntu:Pro:16.04:LTS
rsync

Package

Name
rsync
Purl
pkg:deb/ubuntu/rsync@3.1.1-3ubuntu1.3+esm4?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.1.1-3
3.1.1-3ubuntu1
3.1.1-3ubuntu1.1
3.1.1-3ubuntu1.2
3.1.1-3ubuntu1.3
3.1.1-3ubuntu1.3+esm1
3.1.1-3ubuntu1.3+esm2
3.1.1-3ubuntu1.3+esm3
3.1.1-3ubuntu1.3+esm4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "rsync",
            "binary_version": "3.1.1-3ubuntu1.3+esm4"
        }
    ],
    "priority_reason": "Per rsync developers this has no security impact"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41035.json"
Ubuntu:Pro:18.04:LTS
rsync

Package

Name
rsync
Purl
pkg:deb/ubuntu/rsync@3.1.2-2.1ubuntu1.6+esm2?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.1.2-2
3.1.2-2.1
3.1.2-2.1ubuntu1
3.1.2-2.1ubuntu1.1
3.1.2-2.1ubuntu1.2
3.1.2-2.1ubuntu1.3
3.1.2-2.1ubuntu1.4
3.1.2-2.1ubuntu1.5
3.1.2-2.1ubuntu1.6
3.1.2-2.1ubuntu1.6+esm1
3.1.2-2.1ubuntu1.6+esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "rsync",
            "binary_version": "3.1.2-2.1ubuntu1.6+esm2"
        }
    ],
    "priority_reason": "Per rsync developers this has no security impact"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-41035.json"