Bug 2326544 (CVE-2024-52522) - CVE-2024-52522 rclone: librclone: improper permission and ownership handling on symlink targets with --links and --metadata
Summary: CVE-2024-52522 rclone: librclone: improper permission and ownership handling ...
Keywords:
Status: NEW
Alias: CVE-2024-52522
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2326579 2326578
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-11-15 18:01 UTC by OSIDB Bzimport
Modified: 2024-11-15 19:23 UTC (History)
6 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-11-15 18:01:48 UTC
Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Insecure handling of symlinks with --links and --metadata in rclone while copying to local disk allows unprivileged users to indirectly modify ownership and permissions on symlink target files when a superuser or privileged process performs a copy. This vulnerability could enable privilege escalation and unauthorized access to critical system files, compromising system integrity, confidentiality, and availability. This vulnerability is fixed in 1.68.2.


Note You need to log in before you can comment on or make changes to this bug.