<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-41035 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-41035/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 16 Apr 2026 07:16:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-41035/feed.xml" rel="self" type="application/rss+xml"/><item><title>rsync Use-After-Free Vulnerability in Extended Attribute Handling (CVE-2026-41035)</title><link>https://feed.craftedsignal.io/briefs/2026-04-rsync-use-after-free/</link><pubDate>Thu, 16 Apr 2026 07:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rsync-use-after-free/</guid><description>rsync versions 3.0.1 through 3.4.1 are vulnerable to a use-after-free vulnerability in the receive_xattr function during a qsort call, triggered by an untrusted length value when the -X/--xattrs option is used, potentially leading to code execution.</description><content:encoded><![CDATA[<p>rsync versions 3.0.1 through 3.4.1 are susceptible to a use-after-free vulnerability identified as CVE-2026-41035. This flaw resides within the <code>receive_xattr</code> function, where an untrusted length value is used during a <code>qsort</code> call. The vulnerability is triggered only when rsync is executed with the <code>-X</code> or <code>--xattrs</code> option, which enables extended attribute handling. While many Linux configurations are vulnerable, the issue is more prevalent on non-Linux platforms. Exploitation of this vulnerability could allow a malicious actor to achieve arbitrary code execution on the target system. Defenders should prioritize patching rsync installations and consider disabling the <code>-X</code> option where extended attributes are not essential.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system where they can influence rsync parameters. This could be through a compromised user account or a vulnerable service.</li>
<li>Attacker crafts a malicious rsync command that includes the <code>-X</code> or <code>--xattrs</code> option to enable extended attribute processing.</li>
<li>The crafted command is executed on the victim machine, targeting a vulnerable rsync version (3.0.1 to 3.4.1).</li>
<li>During the <code>receive_xattr</code> function call, the untrusted length value provided by the attacker is passed to the <code>qsort</code> function.</li>
<li>The <code>qsort</code> function attempts to sort the extended attributes based on the attacker-controlled length.</li>
<li>Due to the manipulated length value, the <code>qsort</code> function accesses memory outside the allocated buffer, leading to a use-after-free condition.</li>
<li>The use-after-free condition allows the attacker to potentially overwrite memory with malicious code.</li>
<li>The attacker&rsquo;s code is executed within the context of the rsync process, granting them control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41035 can lead to arbitrary code execution on the affected system. The impact can range from data corruption to complete system compromise. Given the widespread use of rsync for data synchronization and backups, a successful attack could affect a large number of systems across various sectors. The vulnerability is particularly concerning on non-Linux platforms, where the likelihood of successful exploitation is higher.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade rsync to a version beyond 3.4.1 to patch CVE-2026-41035.</li>
<li>Implement the file integrity monitoring rule to detect unauthorized modification of rsync binaries.</li>
<li>Deploy the Sigma rule to detect rsync commands using the <code>-X</code> or <code>--xattrs</code> option, as those options are required to trigger this vulnerability.</li>
<li>Where possible, disable the use of the <code>-X</code> or <code>--xattrs</code> option for rsync to prevent exploitation of this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rsync</category><category>use-after-free</category><category>cve-2026-41035</category><category>linux</category></item></channel></rss>