First published: Tue Jul 26 2022(Updated: )
Rsync could allow a remote attacker to bypass security restrictions, caused by improper validation of file names. By utilize man-in-the-middle attack techniques, an attacker could exploit this vulnerability to write arbitrary files inside the directories of connecting peers.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Rsync | <3.2.5 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
redhat/rsync | <3.2.5 | 3.2.5 |
redhat/rsync | <0:3.1.2-11.el7_9 | 0:3.1.2-11.el7_9 |
redhat/rsync | <0:3.1.3-14.el8_6.3 | 0:3.1.3-14.el8_6.3 |
redhat/rsync | <0:3.1.3-6.el8_1.2 | 0:3.1.3-6.el8_1.2 |
redhat/rsync | <0:3.1.3-7.el8_2.2 | 0:3.1.3-7.el8_2.2 |
redhat/rsync | <0:3.1.3-12.el8_4.2 | 0:3.1.3-12.el8_4.2 |
redhat/rsync | <0:3.2.3-9.el9_0.2 | 0:3.2.3-9.el9_0.2 |
IBM BM Security Guardium | <=11.3 | |
IBM Security Guardium | <=11.4 | |
IBM Security Guardium | <=11.5 |
Only connecting to trusted Rsync servers over trusted channels would help to mitigate this flaw.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this issue in rsync is CVE-2022-29154.
The severity of CVE-2022-29154 is high.
The vulnerability in rsync allows a remote attacker to bypass security restrictions by improperly validating file names and writing arbitrary files inside the directories of connecting peers.
Versions of rsync before 3.2.5 are affected by CVE-2022-29154.
To fix the vulnerability in rsync, you should update to version 3.2.5 or later.