|
|
Log in / Subscribe / Register

Mageia alert MGASA-2022-0302 (rsync)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2022-0302: Updated rsync packages fix security vulnerability
Date:  Thu, 25 Aug 2022 23:22:13 +0200
Message-ID:  <20220825212213.B6DE3A13B0@duvel.mageia.org>
Archive-link:  Article

MGASA-2022-0302 - Updated rsync packages fix security vulnerability Publication date: 25 Aug 2022 URL: https://advisories.mageia.org/MGASA-2022-0302.html Type: security Affected Mageia releases: 8 CVE: CVE-2022-29154 Description: An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file). (CVE-2022-29154) References: - https://bugs.mageia.org/show_bug.cgi?id=30696 - https://seclists.org/oss-sec/2022/q3/77 - https://www.openwall.com/lists/oss-security/2022/08/02/1 - https://lists.opensuse.org/archives/list/security-announc... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2... SRPMS: - 8/core/rsync-3.2.2-2.1.mga8


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds