QID 354438

Date Published: 2022-12-21

QID 354438: Amazon Linux Security Advisory for rsync : ALAS2022-2022-148

A flaw was found in rsync that is triggered by a victim rsync user/client connecting to a malicious rsync server.
The server can copy and overwrite arbitrary files in the client's rsync target directory and subdirectories.
This flaw allows a malicious server, or in some cases, another attacker who performs a man-in-the-middle attack, to potentially overwrite sensitive files on the client machine, resulting in further exploitation. (
( CVE-2022-29154) a security vulnerability was found in zlib.
The flaw triggered a heap-based buffer in inflate in the inflate.c function via a large gzip header extra field.
This flaw is only applicable in the call inflategetheader. (
( CVE-2022-37434)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2022-2022-148 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 354438

    Software Advisories
    Advisory ID Software Component Link
    ALAS2022-2022-148 amazon linux 2022 URL Logo alas.aws.amazon.com/AL2022/ALAS-2022-148.html