CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
Lifecycle Timeline
2DescriptionNVD
In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.
AnalysisAI
Use-after-free in rsync 3.0.1-3.4.1 allows authenticated remote attackers to corrupt memory during xattr synchronization on the receiver side. Exploitation requires victim to run 'rsync -X' (extended attributes enabled). …
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: Inventory all systems running rsync 3.0.1-3.4.1 and identify which have extended attributes (xattr) synchronization enabled or accessible to authenticated users. Within 7 days: Disable rsync extended attributes functionality ('rsync -X') where not operationally critical, restrict rsync access to trusted networks via firewall rules, and disable rsync service on systems where it is not required. …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-23215
GHSA-m34r-4v3r-pp9v