Source: rclone
Version: 1.60.1+dfsg-4
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for rclone.

CVE-2024-52522[0]:
| Rclone is a command-line program to sync files and directories to
| and from different cloud storage providers. Insecure handling of
| symlinks with --links and --metadata in rclone while copying to
| local disk allows unprivileged users to indirectly modify ownership
| and permissions on symlink target files when a superuser or
| privileged process performs a copy. This vulnerability could enable
| privilege escalation and unauthorized access to critical system
| files, compromising system integrity, confidentiality, and
| availability. This vulnerability is fixed in 1.68.2.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-52522
    https://www.cve.org/CVERecord?id=CVE-2024-52522
[1] https://github.com/rclone/rclone/security/advisories/GHSA-hrxh-9w67-g4cv
[2] 
https://github.com/rclone/rclone/commit/669b2f2669cacd634faa2bcecb589b76e1402533

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to