Name | CVE-2022-29154 |
Description | An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1016543 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
rsync (PTS) | bullseye | 3.2.3-4+deb11u1 | vulnerable |
bookworm | 3.2.7-1 | fixed | |
sid, trixie | 3.3.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
rsync | source | (unstable) | 3.2.5-1 | 1016543 |
[bullseye] - rsync <no-dsa> (Minor issue; for untrusted remote sending hosts additional protective measures can be taken)
[buster] - rsync <ignored> (Minor issue; for untrusted remote sending hosts additional protective measures can be taken. Not backportable without cmdline interface changes.)
https://www.openwall.com/lists/oss-security/2022/08/02/1
https://git.samba.org/?p=rsync.git;a=commit;h=b7231c7d02cfb65d291af74ff66e7d8c507ee871 (v3.2.5pre1)
https://git.samba.org/?p=rsync.git;a=commit;h=7e5424b806e8eea053016268ad186276e9083b77 (v3.2.5pre1)
https://git.samba.org/?p=rsync.git;a=commit;h=3d7015afa223494e3318495c2f5de9cb49229da9 (v3.2.5pre1)
https://git.samba.org/?p=rsync.git;a=commit;h=2f7c583143bc6e80902139c23d9d7283f88fbc6a (v3.2.5pre1)