Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-41035 (GCVE-0-2026-41035)
Vulnerability from cvelistv5 – Published: 2026-04-16 06:53 – Updated: 2026-04-22 03:03- CWE-130 - Improper Handling of Length Parameter Inconsistency
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-41035",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-16T12:20:04.768680Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-16T12:30:58.505Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2026-04-22T03:03:52.565Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2026/04/16/9"
},
{
"url": "http://www.openwall.com/lists/oss-security/2026/04/22/3"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "rsync",
"vendor": "Samba",
"versions": [
{
"lessThanOrEqual": "3.4.1",
"status": "affected",
"version": "3.0.1",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.4.1",
"versionStartIncluding": "3.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-130",
"description": "CWE-130 Improper Handling of Length Parameter Inconsistency",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-16T18:23:49.396Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://www.openwall.com/lists/oss-security/2026/04/16/2"
},
{
"url": "https://github.com/RsyncProject/rsync/releases"
},
{
"url": "https://github.com/RsyncProject/rsync/issues/871"
}
],
"x_generator": {
"engine": "CVE-Request-form 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2026-41035",
"datePublished": "2026-04-16T06:53:05.237Z",
"dateReserved": "2026-04-16T06:53:04.777Z",
"dateUpdated": "2026-04-22T03:03:52.565Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-41035",
"date": "2026-05-22",
"epss": "0.00027",
"percentile": "0.07911"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-41035\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2026-04-16T07:16:31.003\",\"lastModified\":\"2026-05-21T19:23:51.373\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.1,\"impactScore\":3.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-130\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.1\",\"versionEndIncluding\":\"3.4.1\",\"matchCriteriaId\":\"8D9FD7C2-4EA5-4FB6-9B03-CBEF95B5DB20\"}]}]}],\"references\":[{\"url\":\"https://github.com/RsyncProject/rsync/issues/871\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/RsyncProject/rsync/releases\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2026/04/16/2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/04/16/9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/04/22/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2026/04/16/9\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2026/04/22/3\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2026-04-22T03:03:52.565Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-41035\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-16T12:20:04.768680Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-16T12:20:06.184Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Samba\", \"product\": \"rsync\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"3.4.1\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://www.openwall.com/lists/oss-security/2026/04/16/2\"}, {\"url\": \"https://github.com/RsyncProject/rsync/releases\"}, {\"url\": \"https://github.com/RsyncProject/rsync/issues/871\"}], \"x_generator\": {\"engine\": \"CVE-Request-form 0.0.1\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-130\", \"description\": \"CWE-130 Improper Handling of Length Parameter Inconsistency\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"3.4.1\", \"versionStartIncluding\": \"3.0.1\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2026-04-16T18:23:49.396Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-41035\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-22T03:03:52.565Z\", \"dateReserved\": \"2026-04-16T06:53:04.777Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2026-04-16T06:53:05.237Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
alsa-2026:17481
Vulnerability from osv_almalinux
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
- rsync: Rsync: Use-after-free vulnerability in extended attribute handling (CVE-2026-41035)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rsync"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.1.3-25.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "rsync-daemon"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.1.3-25.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. \n\nSecurity Fix(es): \n\n * rsync: Rsync: Use-after-free vulnerability in extended attribute handling (CVE-2026-41035)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:17481",
"modified": "2026-05-15T13:12:22Z",
"published": "2026-05-14T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:17481"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2026-41035"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2458898"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2026-17481.html"
}
],
"related": [
"CVE-2026-41035"
],
"summary": "Important: rsync security update"
}
FKIE_CVE-2026-41035
Vulnerability from fkie_nvd - Published: 2026-04-16 07:16 - Updated: 2026-05-21 19:237.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/RsyncProject/rsync/issues/871 | Issue Tracking | |
| cve@mitre.org | https://github.com/RsyncProject/rsync/releases | Release Notes | |
| cve@mitre.org | https://www.openwall.com/lists/oss-security/2026/04/16/2 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2026/04/16/9 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2026/04/22/3 | Mailing List, Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D9FD7C2-4EA5-4FB6-9B03-CBEF95B5DB20",
"versionEndIncluding": "3.4.1",
"versionStartIncluding": "3.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable."
}
],
"id": "CVE-2026-41035",
"lastModified": "2026-05-21T19:23:51.373",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 3.7,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-04-16T07:16:31.003",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/RsyncProject/rsync/issues/871"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/RsyncProject/rsync/releases"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://www.openwall.com/lists/oss-security/2026/04/16/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2026/04/16/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2026/04/22/3"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-130"
}
],
"source": "cve@mitre.org",
"type": "Secondary"
}
]
}
GHSA-M34R-4V3R-PP9V
Vulnerability from github – Published: 2026-04-16 09:31 – Updated: 2026-04-22 06:30In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.
{
"affected": [],
"aliases": [
"CVE-2026-41035"
],
"database_specific": {
"cwe_ids": [
"CWE-130"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-16T07:16:31Z",
"severity": "HIGH"
},
"details": "In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.",
"id": "GHSA-m34r-4v3r-pp9v",
"modified": "2026-04-22T06:30:28Z",
"published": "2026-04-16T09:31:44Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41035"
},
{
"type": "WEB",
"url": "https://github.com/RsyncProject/rsync/issues/871"
},
{
"type": "WEB",
"url": "https://github.com/RsyncProject/rsync/releases"
},
{
"type": "WEB",
"url": "https://www.openwall.com/lists/oss-security/2026/04/16/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/04/16/9"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/04/22/3"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"type": "CVSS_V3"
}
]
}
MSRC_CVE-2026-41035
Vulnerability from csaf_microsoft - Published: 2026-04-02 00:00 - Updated: 2026-04-18 01:01| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17084-1 | — |
None Available
|
|
| Unresolved product id: 17086-2 | — |
None Available
|
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-41035 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-41035.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "CVE-2026-41035",
"tracking": {
"current_release_date": "2026-04-18T01:01:55.000Z",
"generator": {
"date": "2026-04-19T07:19:01.490Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-41035",
"initial_release_date": "2026-04-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-04-17T01:02:04.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-04-18T01:01:55.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 rsync 3.4.1-2",
"product": {
"name": "azl3 rsync 3.4.1-2",
"product_id": "1"
}
},
{
"category": "product_version_range",
"name": "cbl2 rsync 3.4.1-2",
"product": {
"name": "cbl2 rsync 3.4.1-2",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "rsync"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 rsync 3.4.1-2 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 rsync 3.4.1-2 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-41035",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17084-1",
"17086-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-41035 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-41035.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-04-17T01:02:04.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-1"
]
},
{
"category": "none_available",
"date": "2026-04-17T01:02:04.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"environmentalsScore": 0.0,
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"temporalScore": 7.4,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"17084-1",
"17086-2"
]
}
],
"title": "CVE-2026-41035"
}
]
}
RHSA-2026:17481
Vulnerability from csaf_redhat - Published: 2026-05-14 09:31 - Updated: 2026-05-21 19:35A flaw was found in rsync. When rsync is configured to handle extended attributes (using the -X or --xattrs option), a remote attacker can exploit a use-after-free vulnerability. This occurs because the receive_xattr function incorrectly processes an untrusted length value during a sorting operation, leading to memory corruption. Successful exploitation can result in a denial of service, causing the rsync process to crash, and may potentially allow for arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.10.0.Z.MAIN.EUS:rsync-daemon-0:3.1.3-25.el8_10.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rsync is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.\n\nSecurity Fix(es):\n\n* rsync: Rsync: Use-after-free vulnerability in extended attribute handling (CVE-2026-41035)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:17481",
"url": "https://access.redhat.com/errata/RHSA-2026:17481"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2458898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458898"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_17481.json"
}
],
"title": "Red Hat Security Advisory: rsync security update",
"tracking": {
"current_release_date": "2026-05-21T19:35:25+00:00",
"generator": {
"date": "2026-05-21T19:35:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2026:17481",
"initial_release_date": "2026-05-14T09:31:32+00:00",
"revision_history": [
{
"date": "2026-05-14T09:31:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-14T09:31:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-21T19:35:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.1.3-25.el8_10.src",
"product": {
"name": "rsync-0:3.1.3-25.el8_10.src",
"product_id": "rsync-0:3.1.3-25.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.1.3-25.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.1.3-25.el8_10.aarch64",
"product": {
"name": "rsync-0:3.1.3-25.el8_10.aarch64",
"product_id": "rsync-0:3.1.3-25.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.1.3-25.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.1.3-25.el8_10.aarch64",
"product": {
"name": "rsync-debugsource-0:3.1.3-25.el8_10.aarch64",
"product_id": "rsync-debugsource-0:3.1.3-25.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.1.3-25.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.1.3-25.el8_10.aarch64",
"product": {
"name": "rsync-debuginfo-0:3.1.3-25.el8_10.aarch64",
"product_id": "rsync-debuginfo-0:3.1.3-25.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.1.3-25.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.1.3-25.el8_10.ppc64le",
"product": {
"name": "rsync-0:3.1.3-25.el8_10.ppc64le",
"product_id": "rsync-0:3.1.3-25.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.1.3-25.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.1.3-25.el8_10.ppc64le",
"product": {
"name": "rsync-debugsource-0:3.1.3-25.el8_10.ppc64le",
"product_id": "rsync-debugsource-0:3.1.3-25.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.1.3-25.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.1.3-25.el8_10.ppc64le",
"product": {
"name": "rsync-debuginfo-0:3.1.3-25.el8_10.ppc64le",
"product_id": "rsync-debuginfo-0:3.1.3-25.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.1.3-25.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.1.3-25.el8_10.x86_64",
"product": {
"name": "rsync-0:3.1.3-25.el8_10.x86_64",
"product_id": "rsync-0:3.1.3-25.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.1.3-25.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.1.3-25.el8_10.x86_64",
"product": {
"name": "rsync-debugsource-0:3.1.3-25.el8_10.x86_64",
"product_id": "rsync-debugsource-0:3.1.3-25.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.1.3-25.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.1.3-25.el8_10.x86_64",
"product": {
"name": "rsync-debuginfo-0:3.1.3-25.el8_10.x86_64",
"product_id": "rsync-debuginfo-0:3.1.3-25.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.1.3-25.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.1.3-25.el8_10.s390x",
"product": {
"name": "rsync-0:3.1.3-25.el8_10.s390x",
"product_id": "rsync-0:3.1.3-25.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.1.3-25.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.1.3-25.el8_10.s390x",
"product": {
"name": "rsync-debugsource-0:3.1.3-25.el8_10.s390x",
"product_id": "rsync-debugsource-0:3.1.3-25.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.1.3-25.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.1.3-25.el8_10.s390x",
"product": {
"name": "rsync-debuginfo-0:3.1.3-25.el8_10.s390x",
"product_id": "rsync-debuginfo-0:3.1.3-25.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.1.3-25.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-daemon-0:3.1.3-25.el8_10.noarch",
"product": {
"name": "rsync-daemon-0:3.1.3-25.el8_10.noarch",
"product_id": "rsync-daemon-0:3.1.3-25.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-daemon@3.1.3-25.el8_10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.1.3-25.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.aarch64"
},
"product_reference": "rsync-0:3.1.3-25.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.1.3-25.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.ppc64le"
},
"product_reference": "rsync-0:3.1.3-25.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.1.3-25.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.s390x"
},
"product_reference": "rsync-0:3.1.3-25.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.1.3-25.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.src"
},
"product_reference": "rsync-0:3.1.3-25.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.1.3-25.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.x86_64"
},
"product_reference": "rsync-0:3.1.3-25.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-daemon-0:3.1.3-25.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:rsync-daemon-0:3.1.3-25.el8_10.noarch"
},
"product_reference": "rsync-daemon-0:3.1.3-25.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.1.3-25.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.aarch64"
},
"product_reference": "rsync-debuginfo-0:3.1.3-25.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.1.3-25.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.ppc64le"
},
"product_reference": "rsync-debuginfo-0:3.1.3-25.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.1.3-25.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.s390x"
},
"product_reference": "rsync-debuginfo-0:3.1.3-25.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.1.3-25.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.x86_64"
},
"product_reference": "rsync-debuginfo-0:3.1.3-25.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.1.3-25.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.aarch64"
},
"product_reference": "rsync-debugsource-0:3.1.3-25.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.1.3-25.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.ppc64le"
},
"product_reference": "rsync-debugsource-0:3.1.3-25.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.1.3-25.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.s390x"
},
"product_reference": "rsync-debugsource-0:3.1.3-25.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.1.3-25.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.x86_64"
},
"product_reference": "rsync-debugsource-0:3.1.3-25.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-41035",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"discovery_date": "2026-04-16T08:00:54.200357+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2458898"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rsync. When rsync is configured to handle extended attributes (using the -X or --xattrs option), a remote attacker can exploit a use-after-free vulnerability. This occurs because the receive_xattr function incorrectly processes an untrusted length value during a sorting operation, leading to memory corruption. Successful exploitation can result in a denial of service, causing the rsync process to crash, and may potentially allow for arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsync: Rsync: Use-after-free vulnerability in extended attribute handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important flaw in rsync that allows a remote attacker to cause a denial of service or potentially execute arbitrary code. The vulnerability is present when rsync is used with extended attributes enabled via the `-X` or `--xattrs` option, which is not a default configuration. Exploitation requires the victim to explicitly enable this feature.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-daemon-0:3.1.3-25.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-41035"
},
{
"category": "external",
"summary": "RHBZ#2458898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41035"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-41035",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41035"
},
{
"category": "external",
"summary": "https://github.com/RsyncProject/rsync/issues/871",
"url": "https://github.com/RsyncProject/rsync/issues/871"
},
{
"category": "external",
"summary": "https://github.com/RsyncProject/rsync/releases",
"url": "https://github.com/RsyncProject/rsync/releases"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2026/04/16/2",
"url": "https://www.openwall.com/lists/oss-security/2026/04/16/2"
}
],
"release_date": "2026-04-16T06:53:05.237000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-14T09:31:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-daemon-0:3.1.3-25.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:17481"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, avoid using the -X or --xattrs options with rsync if extended attribute handling is not essential for your operations. Disabling these options prevents the vulnerable code path from being exercised. This may impact functionality that relies on extended attributes.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-daemon-0:3.1.3-25.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-0:3.1.3-25.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-daemon-0:3.1.3-25.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debuginfo-0:3.1.3-25.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:rsync-debugsource-0:3.1.3-25.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "rsync: Rsync: Use-after-free vulnerability in extended attribute handling"
}
]
}
RHSA-2026:19152
Vulnerability from csaf_redhat - Published: 2026-05-19 16:27 - Updated: 2026-05-21 19:35A flaw was found in rsync. When rsync is configured to handle extended attributes (using the -X or --xattrs option), a remote attacker can exploit a use-after-free vulnerability. This occurs because the receive_xattr function incorrectly processes an untrusted length value during a sorting operation, leading to memory corruption. Successful exploitation can result in a denial of service, causing the rsync process to crash, and may potentially allow for arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.Z:rsync-daemon-0:3.4.1-6.el10_2.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.Z:rsync-rrsync-0:3.4.1-6.el10_2.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-daemon-0:3.4.1-6.el10_2.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.Z:rsync-rrsync-0:3.4.1-6.el10_2.noarch | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rsync is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.\n\nSecurity Fix(es):\n\n* rsync: Rsync: Use-after-free vulnerability in extended attribute handling (CVE-2026-41035)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:19152",
"url": "https://access.redhat.com/errata/RHSA-2026:19152"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2458898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458898"
},
{
"category": "external",
"summary": "RHEL-172276",
"url": "https://issues.redhat.com/browse/RHEL-172276"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_19152.json"
}
],
"title": "Red Hat Security Advisory: rsync security update",
"tracking": {
"current_release_date": "2026-05-21T19:35:31+00:00",
"generator": {
"date": "2026-05-21T19:35:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2026:19152",
"initial_release_date": "2026-05-19T16:27:46+00:00",
"revision_history": [
{
"date": "2026-05-19T16:27:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-19T16:27:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-21T19:35:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-daemon-0:3.4.1-6.el10_2.noarch",
"product": {
"name": "rsync-daemon-0:3.4.1-6.el10_2.noarch",
"product_id": "rsync-daemon-0:3.4.1-6.el10_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-daemon@3.4.1-6.el10_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rsync-rrsync-0:3.4.1-6.el10_2.noarch",
"product": {
"name": "rsync-rrsync-0:3.4.1-6.el10_2.noarch",
"product_id": "rsync-rrsync-0:3.4.1-6.el10_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-rrsync@3.4.1-6.el10_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.4.1-6.el10_2.src",
"product": {
"name": "rsync-0:3.4.1-6.el10_2.src",
"product_id": "rsync-0:3.4.1-6.el10_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.4.1-6.el10_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.4.1-6.el10_2.aarch64",
"product": {
"name": "rsync-0:3.4.1-6.el10_2.aarch64",
"product_id": "rsync-0:3.4.1-6.el10_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.4.1-6.el10_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.4.1-6.el10_2.aarch64",
"product": {
"name": "rsync-debugsource-0:3.4.1-6.el10_2.aarch64",
"product_id": "rsync-debugsource-0:3.4.1-6.el10_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.4.1-6.el10_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.aarch64",
"product": {
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.aarch64",
"product_id": "rsync-debuginfo-0:3.4.1-6.el10_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.4.1-6.el10_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.4.1-6.el10_2.ppc64le",
"product": {
"name": "rsync-0:3.4.1-6.el10_2.ppc64le",
"product_id": "rsync-0:3.4.1-6.el10_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.4.1-6.el10_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.4.1-6.el10_2.ppc64le",
"product": {
"name": "rsync-debugsource-0:3.4.1-6.el10_2.ppc64le",
"product_id": "rsync-debugsource-0:3.4.1-6.el10_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.4.1-6.el10_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le",
"product": {
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le",
"product_id": "rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.4.1-6.el10_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.4.1-6.el10_2.s390x",
"product": {
"name": "rsync-0:3.4.1-6.el10_2.s390x",
"product_id": "rsync-0:3.4.1-6.el10_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.4.1-6.el10_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.4.1-6.el10_2.s390x",
"product": {
"name": "rsync-debugsource-0:3.4.1-6.el10_2.s390x",
"product_id": "rsync-debugsource-0:3.4.1-6.el10_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.4.1-6.el10_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.s390x",
"product": {
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.s390x",
"product_id": "rsync-debuginfo-0:3.4.1-6.el10_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.4.1-6.el10_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.4.1-6.el10_2.x86_64",
"product": {
"name": "rsync-0:3.4.1-6.el10_2.x86_64",
"product_id": "rsync-0:3.4.1-6.el10_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.4.1-6.el10_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.4.1-6.el10_2.x86_64",
"product": {
"name": "rsync-debugsource-0:3.4.1-6.el10_2.x86_64",
"product_id": "rsync-debugsource-0:3.4.1-6.el10_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.4.1-6.el10_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.x86_64",
"product": {
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.x86_64",
"product_id": "rsync-debuginfo-0:3.4.1-6.el10_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.4.1-6.el10_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-6.el10_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.aarch64"
},
"product_reference": "rsync-0:3.4.1-6.el10_2.aarch64",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-6.el10_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.ppc64le"
},
"product_reference": "rsync-0:3.4.1-6.el10_2.ppc64le",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-6.el10_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.s390x"
},
"product_reference": "rsync-0:3.4.1-6.el10_2.s390x",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-6.el10_2.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.src"
},
"product_reference": "rsync-0:3.4.1-6.el10_2.src",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-6.el10_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.x86_64"
},
"product_reference": "rsync-0:3.4.1-6.el10_2.x86_64",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-daemon-0:3.4.1-6.el10_2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-daemon-0:3.4.1-6.el10_2.noarch"
},
"product_reference": "rsync-daemon-0:3.4.1-6.el10_2.noarch",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.aarch64"
},
"product_reference": "rsync-debuginfo-0:3.4.1-6.el10_2.aarch64",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le"
},
"product_reference": "rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.s390x"
},
"product_reference": "rsync-debuginfo-0:3.4.1-6.el10_2.s390x",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.x86_64"
},
"product_reference": "rsync-debuginfo-0:3.4.1-6.el10_2.x86_64",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-6.el10_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.aarch64"
},
"product_reference": "rsync-debugsource-0:3.4.1-6.el10_2.aarch64",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-6.el10_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.ppc64le"
},
"product_reference": "rsync-debugsource-0:3.4.1-6.el10_2.ppc64le",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-6.el10_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.s390x"
},
"product_reference": "rsync-debugsource-0:3.4.1-6.el10_2.s390x",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-6.el10_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.x86_64"
},
"product_reference": "rsync-debugsource-0:3.4.1-6.el10_2.x86_64",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-rrsync-0:3.4.1-6.el10_2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.Z:rsync-rrsync-0:3.4.1-6.el10_2.noarch"
},
"product_reference": "rsync-rrsync-0:3.4.1-6.el10_2.noarch",
"relates_to_product_reference": "AppStream-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-6.el10_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.aarch64"
},
"product_reference": "rsync-0:3.4.1-6.el10_2.aarch64",
"relates_to_product_reference": "BaseOS-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-6.el10_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.ppc64le"
},
"product_reference": "rsync-0:3.4.1-6.el10_2.ppc64le",
"relates_to_product_reference": "BaseOS-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-6.el10_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.s390x"
},
"product_reference": "rsync-0:3.4.1-6.el10_2.s390x",
"relates_to_product_reference": "BaseOS-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-6.el10_2.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.src"
},
"product_reference": "rsync-0:3.4.1-6.el10_2.src",
"relates_to_product_reference": "BaseOS-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.4.1-6.el10_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.x86_64"
},
"product_reference": "rsync-0:3.4.1-6.el10_2.x86_64",
"relates_to_product_reference": "BaseOS-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-daemon-0:3.4.1-6.el10_2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-daemon-0:3.4.1-6.el10_2.noarch"
},
"product_reference": "rsync-daemon-0:3.4.1-6.el10_2.noarch",
"relates_to_product_reference": "BaseOS-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.aarch64"
},
"product_reference": "rsync-debuginfo-0:3.4.1-6.el10_2.aarch64",
"relates_to_product_reference": "BaseOS-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le"
},
"product_reference": "rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le",
"relates_to_product_reference": "BaseOS-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.s390x"
},
"product_reference": "rsync-debuginfo-0:3.4.1-6.el10_2.s390x",
"relates_to_product_reference": "BaseOS-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.4.1-6.el10_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.x86_64"
},
"product_reference": "rsync-debuginfo-0:3.4.1-6.el10_2.x86_64",
"relates_to_product_reference": "BaseOS-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-6.el10_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.aarch64"
},
"product_reference": "rsync-debugsource-0:3.4.1-6.el10_2.aarch64",
"relates_to_product_reference": "BaseOS-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-6.el10_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.ppc64le"
},
"product_reference": "rsync-debugsource-0:3.4.1-6.el10_2.ppc64le",
"relates_to_product_reference": "BaseOS-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-6.el10_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.s390x"
},
"product_reference": "rsync-debugsource-0:3.4.1-6.el10_2.s390x",
"relates_to_product_reference": "BaseOS-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.4.1-6.el10_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.x86_64"
},
"product_reference": "rsync-debugsource-0:3.4.1-6.el10_2.x86_64",
"relates_to_product_reference": "BaseOS-10.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-rrsync-0:3.4.1-6.el10_2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.Z:rsync-rrsync-0:3.4.1-6.el10_2.noarch"
},
"product_reference": "rsync-rrsync-0:3.4.1-6.el10_2.noarch",
"relates_to_product_reference": "BaseOS-10.2.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-41035",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"discovery_date": "2026-04-16T08:00:54.200357+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2458898"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rsync. When rsync is configured to handle extended attributes (using the -X or --xattrs option), a remote attacker can exploit a use-after-free vulnerability. This occurs because the receive_xattr function incorrectly processes an untrusted length value during a sorting operation, leading to memory corruption. Successful exploitation can result in a denial of service, causing the rsync process to crash, and may potentially allow for arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsync: Rsync: Use-after-free vulnerability in extended attribute handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important flaw in rsync that allows a remote attacker to cause a denial of service or potentially execute arbitrary code. The vulnerability is present when rsync is used with extended attributes enabled via the `-X` or `--xattrs` option, which is not a default configuration. Exploitation requires the victim to explicitly enable this feature.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.aarch64",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.ppc64le",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.s390x",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.src",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.x86_64",
"AppStream-10.2.Z:rsync-daemon-0:3.4.1-6.el10_2.noarch",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.aarch64",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.s390x",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.x86_64",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.aarch64",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.ppc64le",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.s390x",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.x86_64",
"AppStream-10.2.Z:rsync-rrsync-0:3.4.1-6.el10_2.noarch",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.aarch64",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.ppc64le",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.s390x",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.src",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.x86_64",
"BaseOS-10.2.Z:rsync-daemon-0:3.4.1-6.el10_2.noarch",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.aarch64",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.s390x",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.x86_64",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.aarch64",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.ppc64le",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.s390x",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.x86_64",
"BaseOS-10.2.Z:rsync-rrsync-0:3.4.1-6.el10_2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-41035"
},
{
"category": "external",
"summary": "RHBZ#2458898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41035"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-41035",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41035"
},
{
"category": "external",
"summary": "https://github.com/RsyncProject/rsync/issues/871",
"url": "https://github.com/RsyncProject/rsync/issues/871"
},
{
"category": "external",
"summary": "https://github.com/RsyncProject/rsync/releases",
"url": "https://github.com/RsyncProject/rsync/releases"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2026/04/16/2",
"url": "https://www.openwall.com/lists/oss-security/2026/04/16/2"
}
],
"release_date": "2026-04-16T06:53:05.237000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-19T16:27:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.aarch64",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.ppc64le",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.s390x",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.src",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.x86_64",
"AppStream-10.2.Z:rsync-daemon-0:3.4.1-6.el10_2.noarch",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.aarch64",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.s390x",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.x86_64",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.aarch64",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.ppc64le",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.s390x",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.x86_64",
"AppStream-10.2.Z:rsync-rrsync-0:3.4.1-6.el10_2.noarch",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.aarch64",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.ppc64le",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.s390x",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.src",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.x86_64",
"BaseOS-10.2.Z:rsync-daemon-0:3.4.1-6.el10_2.noarch",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.aarch64",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.s390x",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.x86_64",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.aarch64",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.ppc64le",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.s390x",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.x86_64",
"BaseOS-10.2.Z:rsync-rrsync-0:3.4.1-6.el10_2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:19152"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, avoid using the -X or --xattrs options with rsync if extended attribute handling is not essential for your operations. Disabling these options prevents the vulnerable code path from being exercised. This may impact functionality that relies on extended attributes.",
"product_ids": [
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.aarch64",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.ppc64le",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.s390x",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.src",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.x86_64",
"AppStream-10.2.Z:rsync-daemon-0:3.4.1-6.el10_2.noarch",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.aarch64",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.s390x",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.x86_64",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.aarch64",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.ppc64le",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.s390x",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.x86_64",
"AppStream-10.2.Z:rsync-rrsync-0:3.4.1-6.el10_2.noarch",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.aarch64",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.ppc64le",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.s390x",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.src",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.x86_64",
"BaseOS-10.2.Z:rsync-daemon-0:3.4.1-6.el10_2.noarch",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.aarch64",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.s390x",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.x86_64",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.aarch64",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.ppc64le",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.s390x",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.x86_64",
"BaseOS-10.2.Z:rsync-rrsync-0:3.4.1-6.el10_2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.aarch64",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.ppc64le",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.s390x",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.src",
"AppStream-10.2.Z:rsync-0:3.4.1-6.el10_2.x86_64",
"AppStream-10.2.Z:rsync-daemon-0:3.4.1-6.el10_2.noarch",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.aarch64",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.s390x",
"AppStream-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.x86_64",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.aarch64",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.ppc64le",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.s390x",
"AppStream-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.x86_64",
"AppStream-10.2.Z:rsync-rrsync-0:3.4.1-6.el10_2.noarch",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.aarch64",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.ppc64le",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.s390x",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.src",
"BaseOS-10.2.Z:rsync-0:3.4.1-6.el10_2.x86_64",
"BaseOS-10.2.Z:rsync-daemon-0:3.4.1-6.el10_2.noarch",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.aarch64",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.ppc64le",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.s390x",
"BaseOS-10.2.Z:rsync-debuginfo-0:3.4.1-6.el10_2.x86_64",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.aarch64",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.ppc64le",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.s390x",
"BaseOS-10.2.Z:rsync-debugsource-0:3.4.1-6.el10_2.x86_64",
"BaseOS-10.2.Z:rsync-rrsync-0:3.4.1-6.el10_2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "rsync: Rsync: Use-after-free vulnerability in extended attribute handling"
}
]
}
RHSA-2026:19368
Vulnerability from csaf_redhat - Published: 2026-05-19 22:14 - Updated: 2026-05-21 19:35A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch | — |
Vendor Fix
fix
Workaround
|
A flaw was found in rsync. When rsync is configured to handle extended attributes (using the -X or --xattrs option), a remote attacker can exploit a use-after-free vulnerability. This occurs because the receive_xattr function incorrectly processes an untrusted length value during a sorting operation, leading to memory corruption. Successful exploitation can result in a denial of service, causing the rsync process to crash, and may potentially allow for arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rsync is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.\n\nSecurity Fix(es):\n\n* rsync: rsync server leaks arbitrary client files (CVE-2024-12086)\n\n* rsync: Rsync: Use-after-free vulnerability in extended attribute handling (CVE-2026-41035)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:19368",
"url": "https://access.redhat.com/errata/RHSA-2026:19368"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2330577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330577"
},
{
"category": "external",
"summary": "2458898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458898"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_19368.json"
}
],
"title": "Red Hat Security Advisory: rsync security update",
"tracking": {
"current_release_date": "2026-05-21T19:35:32+00:00",
"generator": {
"date": "2026-05-21T19:35:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2026:19368",
"initial_release_date": "2026-05-19T22:14:02+00:00",
"revision_history": [
{
"date": "2026-05-19T22:14:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-19T22:14:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-21T19:35:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.2.5-7.el9_8.src",
"product": {
"name": "rsync-0:3.2.5-7.el9_8.src",
"product_id": "rsync-0:3.2.5-7.el9_8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.2.5-7.el9_8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.2.5-7.el9_8.aarch64",
"product": {
"name": "rsync-0:3.2.5-7.el9_8.aarch64",
"product_id": "rsync-0:3.2.5-7.el9_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.2.5-7.el9_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"product": {
"name": "rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"product_id": "rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.2.5-7.el9_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"product": {
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"product_id": "rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.2.5-7.el9_8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.2.5-7.el9_8.ppc64le",
"product": {
"name": "rsync-0:3.2.5-7.el9_8.ppc64le",
"product_id": "rsync-0:3.2.5-7.el9_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.2.5-7.el9_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"product": {
"name": "rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"product_id": "rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.2.5-7.el9_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"product": {
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"product_id": "rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.2.5-7.el9_8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.2.5-7.el9_8.x86_64",
"product": {
"name": "rsync-0:3.2.5-7.el9_8.x86_64",
"product_id": "rsync-0:3.2.5-7.el9_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.2.5-7.el9_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"product": {
"name": "rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"product_id": "rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.2.5-7.el9_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"product": {
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"product_id": "rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.2.5-7.el9_8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-0:3.2.5-7.el9_8.s390x",
"product": {
"name": "rsync-0:3.2.5-7.el9_8.s390x",
"product_id": "rsync-0:3.2.5-7.el9_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync@3.2.5-7.el9_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"product": {
"name": "rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"product_id": "rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debugsource@3.2.5-7.el9_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"product": {
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"product_id": "rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-debuginfo@3.2.5-7.el9_8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-daemon-0:3.2.5-7.el9_8.noarch",
"product": {
"name": "rsync-daemon-0:3.2.5-7.el9_8.noarch",
"product_id": "rsync-daemon-0:3.2.5-7.el9_8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-daemon@3.2.5-7.el9_8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rsync-rrsync-0:3.2.5-7.el9_8.noarch",
"product": {
"name": "rsync-rrsync-0:3.2.5-7.el9_8.noarch",
"product_id": "rsync-rrsync-0:3.2.5-7.el9_8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rsync-rrsync@3.2.5-7.el9_8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.2.5-7.el9_8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64"
},
"product_reference": "rsync-0:3.2.5-7.el9_8.aarch64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.2.5-7.el9_8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le"
},
"product_reference": "rsync-0:3.2.5-7.el9_8.ppc64le",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.2.5-7.el9_8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x"
},
"product_reference": "rsync-0:3.2.5-7.el9_8.s390x",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.2.5-7.el9_8.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src"
},
"product_reference": "rsync-0:3.2.5-7.el9_8.src",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.2.5-7.el9_8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64"
},
"product_reference": "rsync-0:3.2.5-7.el9_8.x86_64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-daemon-0:3.2.5-7.el9_8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch"
},
"product_reference": "rsync-daemon-0:3.2.5-7.el9_8.noarch",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64"
},
"product_reference": "rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le"
},
"product_reference": "rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x"
},
"product_reference": "rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64"
},
"product_reference": "rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.2.5-7.el9_8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64"
},
"product_reference": "rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.2.5-7.el9_8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le"
},
"product_reference": "rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.2.5-7.el9_8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x"
},
"product_reference": "rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.2.5-7.el9_8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64"
},
"product_reference": "rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-rrsync-0:3.2.5-7.el9_8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch"
},
"product_reference": "rsync-rrsync-0:3.2.5-7.el9_8.noarch",
"relates_to_product_reference": "AppStream-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.2.5-7.el9_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64"
},
"product_reference": "rsync-0:3.2.5-7.el9_8.aarch64",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.2.5-7.el9_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le"
},
"product_reference": "rsync-0:3.2.5-7.el9_8.ppc64le",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.2.5-7.el9_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x"
},
"product_reference": "rsync-0:3.2.5-7.el9_8.s390x",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.2.5-7.el9_8.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src"
},
"product_reference": "rsync-0:3.2.5-7.el9_8.src",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-0:3.2.5-7.el9_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64"
},
"product_reference": "rsync-0:3.2.5-7.el9_8.x86_64",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-daemon-0:3.2.5-7.el9_8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch"
},
"product_reference": "rsync-daemon-0:3.2.5-7.el9_8.noarch",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64"
},
"product_reference": "rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le"
},
"product_reference": "rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x"
},
"product_reference": "rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debuginfo-0:3.2.5-7.el9_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64"
},
"product_reference": "rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.2.5-7.el9_8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64"
},
"product_reference": "rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.2.5-7.el9_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le"
},
"product_reference": "rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.2.5-7.el9_8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x"
},
"product_reference": "rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-debugsource-0:3.2.5-7.el9_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64"
},
"product_reference": "rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-rrsync-0:3.2.5-7.el9_8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch"
},
"product_reference": "rsync-rrsync-0:3.2.5-7.el9_8.noarch",
"relates_to_product_reference": "BaseOS-9.8.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jasiel Spelman",
"Simon Scannell",
"Pedro Gallegos"
],
"organization": "Google"
}
],
"cve": "CVE-2024-12086",
"cwe": {
"id": "CWE-390",
"name": "Detection of Error Condition Without Action"
},
"discovery_date": "2024-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2330577"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client\u0027s machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsync: rsync server leaks arbitrary client files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as moderate rather than important because it requires the attacker to control the rsync server, which limits the scope of exploitation to scenarios where the client interacts with untrusted or compromised servers. Additionally, the attack is non-trivial, as it relies on the attacker sending specially crafted checksum values and deducing file contents byte-by-byte based on the client\u2019s responses. This makes the exploit more complex and time-consuming compared to direct file access vulnerabilities. Furthermore, the impact is limited to file data enumeration, and it does not allow arbitrary code execution or privilege escalation on the client.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-12086"
},
{
"category": "external",
"summary": "RHBZ#2330577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2330577"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12086"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/952657",
"url": "https://kb.cert.org/vuls/id/952657"
}
],
"release_date": "2025-01-14T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-19T22:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:19368"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rsync: rsync server leaks arbitrary client files"
},
{
"cve": "CVE-2026-41035",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"discovery_date": "2026-04-16T08:00:54.200357+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2458898"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rsync. When rsync is configured to handle extended attributes (using the -X or --xattrs option), a remote attacker can exploit a use-after-free vulnerability. This occurs because the receive_xattr function incorrectly processes an untrusted length value during a sorting operation, leading to memory corruption. Successful exploitation can result in a denial of service, causing the rsync process to crash, and may potentially allow for arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsync: Rsync: Use-after-free vulnerability in extended attribute handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is an Important flaw in rsync that allows a remote attacker to cause a denial of service or potentially execute arbitrary code. The vulnerability is present when rsync is used with extended attributes enabled via the `-X` or `--xattrs` option, which is not a default configuration. Exploitation requires the victim to explicitly enable this feature.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-41035"
},
{
"category": "external",
"summary": "RHBZ#2458898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2458898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-41035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41035"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-41035",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41035"
},
{
"category": "external",
"summary": "https://github.com/RsyncProject/rsync/issues/871",
"url": "https://github.com/RsyncProject/rsync/issues/871"
},
{
"category": "external",
"summary": "https://github.com/RsyncProject/rsync/releases",
"url": "https://github.com/RsyncProject/rsync/releases"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2026/04/16/2",
"url": "https://www.openwall.com/lists/oss-security/2026/04/16/2"
}
],
"release_date": "2026-04-16T06:53:05.237000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-19T22:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:19368"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, avoid using the -X or --xattrs options with rsync if extended attribute handling is not essential for your operations. Disabling these options prevents the vulnerable code path from being exercised. This may impact functionality that relies on extended attributes.",
"product_ids": [
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"AppStream-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.src",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-daemon-0:3.2.5-7.el9_8.noarch",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debuginfo-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.aarch64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.ppc64le",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.s390x",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-debugsource-0:3.2.5-7.el9_8.x86_64",
"BaseOS-9.8.0.Z.MAIN.EUS:rsync-rrsync-0:3.2.5-7.el9_8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "rsync: Rsync: Use-after-free vulnerability in extended attribute handling"
}
]
}
SUSE-SU-2026:2002-1
Vulnerability from csaf_suse - Published: 2026-05-19 08:21 - Updated: 2026-05-19 08:21| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:rsync-3.1.3-3.40.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rsync",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rsync fixes the following issue\n\n- CVE-2026-41035: count of entries mismatch can lead to a use-after-free (bsc#1262223).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-2002,SUSE-SLE-SERVER-12-SP5-LTSS-2026-2002,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-2002",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_2002-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:2002-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20262002-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:2002-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046579.html"
},
{
"category": "self",
"summary": "SUSE Bug 1262223",
"url": "https://bugzilla.suse.com/1262223"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-41035 page",
"url": "https://www.suse.com/security/cve/CVE-2026-41035/"
}
],
"title": "Security update for rsync",
"tracking": {
"current_release_date": "2026-05-19T08:21:38Z",
"generator": {
"date": "2026-05-19T08:21:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:2002-1",
"initial_release_date": "2026-05-19T08:21:38Z",
"revision_history": [
{
"date": "2026-05-19T08:21:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.1.3-3.40.1.aarch64",
"product": {
"name": "rsync-3.1.3-3.40.1.aarch64",
"product_id": "rsync-3.1.3-3.40.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.1.3-3.40.1.i586",
"product": {
"name": "rsync-3.1.3-3.40.1.i586",
"product_id": "rsync-3.1.3-3.40.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.1.3-3.40.1.ppc64le",
"product": {
"name": "rsync-3.1.3-3.40.1.ppc64le",
"product_id": "rsync-3.1.3-3.40.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.1.3-3.40.1.s390",
"product": {
"name": "rsync-3.1.3-3.40.1.s390",
"product_id": "rsync-3.1.3-3.40.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.1.3-3.40.1.s390x",
"product": {
"name": "rsync-3.1.3-3.40.1.s390x",
"product_id": "rsync-3.1.3-3.40.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.1.3-3.40.1.x86_64",
"product": {
"name": "rsync-3.1.3-3.40.1.x86_64",
"product_id": "rsync-3.1.3-3.40.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.1.3-3.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.aarch64"
},
"product_reference": "rsync-3.1.3-3.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.1.3-3.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.ppc64le"
},
"product_reference": "rsync-3.1.3-3.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.1.3-3.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.s390x"
},
"product_reference": "rsync-3.1.3-3.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.1.3-3.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.x86_64"
},
"product_reference": "rsync-3.1.3-3.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.1.3-3.40.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:rsync-3.1.3-3.40.1.x86_64"
},
"product_reference": "rsync-3.1.3-3.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-41035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-41035"
}
],
"notes": [
{
"category": "general",
"text": "In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:rsync-3.1.3-3.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-41035",
"url": "https://www.suse.com/security/cve/CVE-2026-41035"
},
{
"category": "external",
"summary": "SUSE Bug 1262223 for CVE-2026-41035",
"url": "https://bugzilla.suse.com/1262223"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:rsync-3.1.3-3.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:rsync-3.1.3-3.40.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:rsync-3.1.3-3.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-19T08:21:38Z",
"details": "important"
}
],
"title": "CVE-2026-41035"
}
]
}
SUSE-SU-2026:2038-1
Vulnerability from csaf_suse - Published: 2026-05-21 13:33 - Updated: 2026-05-21 13:33| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rsync",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rsync fixes the following issues\n\n \n- CVE-2026-29518: Symlink-Race TOCTOU in Daemon (bsc#1264511).\n- CVE-2026-41035: Count of entries mismatch can lead to a use-after-free (bsc#1262223)\n- CVE-2026-43617: Authorization Bypass via Hostname Resolution (bsc#1264515).\n- CVE-2026-43618: Integer Overflow Information Disclosure (bsc#1264512).\n- CVE-2026-43619: Symlink Race Condition via Path-Based Syscalls (bsc#1264514).\n- CVE-2026-43620: Out-of-Bounds Array Read via recv_files() (bsc#1264513).\n- CVE-2026-45232: Off-by-one stack OOB write in HTTP CONNECT proxy response parsing (bsc#1265296).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-2038,SUSE-SLE-Module-Basesystem-15-SP7-2026-2038,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-2038,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-2038",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_2038-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:2038-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20262038-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:2038-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046686.html"
},
{
"category": "self",
"summary": "SUSE Bug 1234100",
"url": "https://bugzilla.suse.com/1234100"
},
{
"category": "self",
"summary": "SUSE Bug 1234101",
"url": "https://bugzilla.suse.com/1234101"
},
{
"category": "self",
"summary": "SUSE Bug 1234102",
"url": "https://bugzilla.suse.com/1234102"
},
{
"category": "self",
"summary": "SUSE Bug 1234103",
"url": "https://bugzilla.suse.com/1234103"
},
{
"category": "self",
"summary": "SUSE Bug 1234104",
"url": "https://bugzilla.suse.com/1234104"
},
{
"category": "self",
"summary": "SUSE Bug 1235475",
"url": "https://bugzilla.suse.com/1235475"
},
{
"category": "self",
"summary": "SUSE Bug 1254441",
"url": "https://bugzilla.suse.com/1254441"
},
{
"category": "self",
"summary": "SUSE Bug 1262223",
"url": "https://bugzilla.suse.com/1262223"
},
{
"category": "self",
"summary": "SUSE Bug 1264511",
"url": "https://bugzilla.suse.com/1264511"
},
{
"category": "self",
"summary": "SUSE Bug 1264512",
"url": "https://bugzilla.suse.com/1264512"
},
{
"category": "self",
"summary": "SUSE Bug 1264513",
"url": "https://bugzilla.suse.com/1264513"
},
{
"category": "self",
"summary": "SUSE Bug 1264514",
"url": "https://bugzilla.suse.com/1264514"
},
{
"category": "self",
"summary": "SUSE Bug 1264515",
"url": "https://bugzilla.suse.com/1264515"
},
{
"category": "self",
"summary": "SUSE Bug 1265296",
"url": "https://bugzilla.suse.com/1265296"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12084 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12085 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12086 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12087 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12088 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12747 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-10158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-10158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-29518 page",
"url": "https://www.suse.com/security/cve/CVE-2026-29518/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-41035 page",
"url": "https://www.suse.com/security/cve/CVE-2026-41035/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43617 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43618 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43619 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43620 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-45232 page",
"url": "https://www.suse.com/security/cve/CVE-2026-45232/"
}
],
"title": "Security update for rsync",
"tracking": {
"current_release_date": "2026-05-21T13:33:41Z",
"generator": {
"date": "2026-05-21T13:33:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:2038-1",
"initial_release_date": "2026-05-21T13:33:41Z",
"revision_history": [
{
"date": "2026-05-21T13:33:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-150600.3.21.1.aarch64",
"product": {
"name": "rsync-3.2.7-150600.3.21.1.aarch64",
"product_id": "rsync-3.2.7-150600.3.21.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-150600.3.21.1.i586",
"product": {
"name": "rsync-3.2.7-150600.3.21.1.i586",
"product_id": "rsync-3.2.7-150600.3.21.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-150600.3.21.1.ppc64le",
"product": {
"name": "rsync-3.2.7-150600.3.21.1.ppc64le",
"product_id": "rsync-3.2.7-150600.3.21.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-150600.3.21.1.s390x",
"product": {
"name": "rsync-3.2.7-150600.3.21.1.s390x",
"product_id": "rsync-3.2.7-150600.3.21.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-150600.3.21.1.x86_64",
"product": {
"name": "rsync-3.2.7-150600.3.21.1.x86_64",
"product_id": "rsync-3.2.7-150600.3.21.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-150600.3.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
},
"product_reference": "rsync-3.2.7-150600.3.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-12084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12084"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12084",
"url": "https://www.suse.com/security/cve/CVE-2024-12084"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12084",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234100 for CVE-2024-12084",
"url": "https://bugzilla.suse.com/1234100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "critical"
}
],
"title": "CVE-2024-12084"
},
{
"cve": "CVE-2024-12085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12085"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12085",
"url": "https://www.suse.com/security/cve/CVE-2024-12085"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12085",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234101 for CVE-2024-12085",
"url": "https://bugzilla.suse.com/1234101"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-12085"
},
{
"cve": "CVE-2024-12086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12086"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client\u0027s machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12086",
"url": "https://www.suse.com/security/cve/CVE-2024-12086"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12086",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234102 for CVE-2024-12086",
"url": "https://bugzilla.suse.com/1234102"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-12086"
},
{
"cve": "CVE-2024-12087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12087"
}
],
"notes": [
{
"category": "general",
"text": "A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client\u0027s intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12087",
"url": "https://www.suse.com/security/cve/CVE-2024-12087"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12087",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234103 for CVE-2024-12087",
"url": "https://bugzilla.suse.com/1234103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "important"
}
],
"title": "CVE-2024-12087"
},
{
"cve": "CVE-2024-12088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12088"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12088",
"url": "https://www.suse.com/security/cve/CVE-2024-12088"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12088",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1234104 for CVE-2024-12088",
"url": "https://bugzilla.suse.com/1234104"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-12088"
},
{
"cve": "CVE-2024-12747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12747"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in rsync. This vulnerability arises from a race condition during rsync\u0027s handling of symbolic links. Rsync\u0027s default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12747",
"url": "https://www.suse.com/security/cve/CVE-2024-12747"
},
{
"category": "external",
"summary": "SUSE Bug 1233760 for CVE-2024-12747",
"url": "https://bugzilla.suse.com/1233760"
},
{
"category": "external",
"summary": "SUSE Bug 1235475 for CVE-2024-12747",
"url": "https://bugzilla.suse.com/1235475"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-12747"
},
{
"cve": "CVE-2025-10158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-10158"
}
],
"notes": [
{
"category": "general",
"text": "A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The \n\nmalicious \n\nrsync client requires at least read access to the remote rsync module in order to trigger the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-10158",
"url": "https://www.suse.com/security/cve/CVE-2025-10158"
},
{
"category": "external",
"summary": "SUSE Bug 1254441 for CVE-2025-10158",
"url": "https://bugzilla.suse.com/1254441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-10158"
},
{
"cve": "CVE-2026-29518",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-29518"
}
],
"notes": [
{
"category": "general",
"text": "Rsync versions before 3.4.3 contain a time-of-check to time-of-use (TOCTOU) race condition in daemon file handling that allows attackers to redirect file writes outside intended directories by replacing parent directory components with symbolic links. Attackers with write access to a module path can exploit this race condition to create or overwrite arbitrary files, potentially modifying sensitive system files and achieving privilege escalation when the daemon runs with elevated privileges. This vulnerability can only be triggered if the chroot setting is false.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-29518",
"url": "https://www.suse.com/security/cve/CVE-2026-29518"
},
{
"category": "external",
"summary": "SUSE Bug 1264511 for CVE-2026-29518",
"url": "https://bugzilla.suse.com/1264511"
},
{
"category": "external",
"summary": "SUSE Bug 1264514 for CVE-2026-29518",
"url": "https://bugzilla.suse.com/1264514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "important"
}
],
"title": "CVE-2026-29518"
},
{
"cve": "CVE-2026-41035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-41035"
}
],
"notes": [
{
"category": "general",
"text": "In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-41035",
"url": "https://www.suse.com/security/cve/CVE-2026-41035"
},
{
"category": "external",
"summary": "SUSE Bug 1262223 for CVE-2026-41035",
"url": "https://bugzilla.suse.com/1262223"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "important"
}
],
"title": "CVE-2026-41035"
},
{
"cve": "CVE-2026-43617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43617"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain an authorization bypass vulnerability in the rsync daemon\u0027s hostname-based access control list enforcement when configured with chroot. Attackers can bypass hostname-based deny rules by controlling the PTR record for their source IP address, allowing connections from hostnames that administrators intended to deny when reverse DNS resolution fails and defaults to UNKNOWN.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43617",
"url": "https://www.suse.com/security/cve/CVE-2026-43617"
},
{
"category": "external",
"summary": "SUSE Bug 1264515 for CVE-2026-43617",
"url": "https://bugzilla.suse.com/1264515"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2026-43617"
},
{
"cve": "CVE-2026-43618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43618"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain an integer overflow vulnerability in the compressed-token decoder where a 32-bit signed counter is not checked for overflow, allowing a malicious sender to trigger an overflow that causes the receiver process to read and return data from outside the intended buffer bounds. Attackers can exploit this vulnerability to disclose process memory contents including environment variables, passwords, heap and stack data, and library memory pointers, significantly reducing ASLR effectiveness and facilitating further exploitation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43618",
"url": "https://www.suse.com/security/cve/CVE-2026-43618"
},
{
"category": "external",
"summary": "SUSE Bug 1264512 for CVE-2026-43618",
"url": "https://bugzilla.suse.com/1264512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "important"
}
],
"title": "CVE-2026-43618"
},
{
"cve": "CVE-2026-43619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43619"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain symlink race condition vulnerabilities in path-based system calls including chmod, lchown, utimes, rename, unlink, mkdir, symlink, mknod, link, rmdir, and lstat that allow local attackers to redirect operations to files outside the exported rsync module. Attackers with local filesystem access can exploit the timing window between path resolution and syscall execution by swapping symlinks to apply sender-supplied permissions, ownership, timestamps, or filenames to arbitrary files outside the intended module boundary on rsync daemons configured with \u0027use chroot = no\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43619",
"url": "https://www.suse.com/security/cve/CVE-2026-43619"
},
{
"category": "external",
"summary": "SUSE Bug 1264514 for CVE-2026-43619",
"url": "https://bugzilla.suse.com/1264514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2026-43619"
},
{
"cve": "CVE-2026-43620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43620"
}
],
"notes": [
{
"category": "general",
"text": "Rsync version 3.4.2 and prior contain a receiver-side out-of-bounds array read vulnerability in recv_files() in receiver.c that allows a malicious rsync server to crash the rsync client process. Attackers can exploit the vulnerability by setting CF_INC_RECURSE in compatibility flags and sending a specially crafted file list where the first sorted entry is not the leading dot directory, followed by a transfer record with ndx=0 and an iflag word without ITEM_TRANSFER, causing the receiver to read 8 bytes before the allocated pointer array and dereference an invalid pointer at an unmapped address, resulting in a deterministic SIGSEGV crash of the rsync client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43620",
"url": "https://www.suse.com/security/cve/CVE-2026-43620"
},
{
"category": "external",
"summary": "SUSE Bug 1264513 for CVE-2026-43620",
"url": "https://bugzilla.suse.com/1264513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2026-43620"
},
{
"cve": "CVE-2026-45232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-45232"
}
],
"notes": [
{
"category": "general",
"text": "Rsync versions before 3.4.3 contain an off-by-one out-of-bounds stack write vulnerability in the establish_proxy_connection() function in socket.c that allows network attackers to corrupt stack memory by sending a malformed HTTP proxy response. Attackers can exploit this by positioning themselves between the client and proxy or controlling the proxy server to send a response line of 1023 or more bytes without a newline terminator, causing a null byte to be written to an out-of-bounds stack address when the RSYNC_PROXY environment variable is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-45232",
"url": "https://www.suse.com/security/cve/CVE-2026-45232"
},
{
"category": "external",
"summary": "SUSE Bug 1265296 for CVE-2026-45232",
"url": "https://bugzilla.suse.com/1265296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:rsync-3.2.7-150600.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:rsync-3.2.7-150600.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-21T13:33:41Z",
"details": "moderate"
}
],
"title": "CVE-2026-45232"
}
]
}
SUSE-SU-2026:21676-1
Vulnerability from csaf_suse - Published: 2026-05-15 10:45 - Updated: 2026-05-15 10:45| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-6.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-6.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:rsync-3.2.7-6.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rsync",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rsync fixes the following issue\n\n- CVE-2026-41035: count of entries mismatch can lead to a use-after-free (bsc#1262223).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-708",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21676-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21676-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621676-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21676-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046591.html"
},
{
"category": "self",
"summary": "SUSE Bug 1262223",
"url": "https://bugzilla.suse.com/1262223"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-41035 page",
"url": "https://www.suse.com/security/cve/CVE-2026-41035/"
}
],
"title": "Security update for rsync",
"tracking": {
"current_release_date": "2026-05-15T10:45:40Z",
"generator": {
"date": "2026-05-15T10:45:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21676-1",
"initial_release_date": "2026-05-15T10:45:40Z",
"revision_history": [
{
"date": "2026-05-15T10:45:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-6.1.aarch64",
"product": {
"name": "rsync-3.2.7-6.1.aarch64",
"product_id": "rsync-3.2.7-6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-6.1.s390x",
"product": {
"name": "rsync-3.2.7-6.1.s390x",
"product_id": "rsync-3.2.7-6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rsync-3.2.7-6.1.x86_64",
"product": {
"name": "rsync-3.2.7-6.1.x86_64",
"product_id": "rsync-3.2.7-6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-6.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:rsync-3.2.7-6.1.aarch64"
},
"product_reference": "rsync-3.2.7-6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-6.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:rsync-3.2.7-6.1.s390x"
},
"product_reference": "rsync-3.2.7-6.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rsync-3.2.7-6.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:rsync-3.2.7-6.1.x86_64"
},
"product_reference": "rsync-3.2.7-6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-41035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-41035"
}
],
"notes": [
{
"category": "general",
"text": "In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rsync-3.2.7-6.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-6.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-41035",
"url": "https://www.suse.com/security/cve/CVE-2026-41035"
},
{
"category": "external",
"summary": "SUSE Bug 1262223 for CVE-2026-41035",
"url": "https://bugzilla.suse.com/1262223"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rsync-3.2.7-6.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-6.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rsync-3.2.7-6.1.aarch64",
"SUSE Linux Micro 6.0:rsync-3.2.7-6.1.s390x",
"SUSE Linux Micro 6.0:rsync-3.2.7-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-15T10:45:40Z",
"details": "important"
}
],
"title": "CVE-2026-41035"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.