Improper Preservation of Permissions Affecting rclone package, versions <1.68.2-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ALPINE321-RCLONE-8489237
  • published6 Dec 2024
  • disclosed15 Nov 2024

Introduced: 15 Nov 2024

CVE-2024-52522  (opens in a new tab)
CWE-281  (opens in a new tab)
CWE-59  (opens in a new tab)
CWE-61  (opens in a new tab)

How to fix?

Upgrade Alpine:3.21 rclone to version 1.68.2-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rclone package and not the rclone package as distributed by Alpine. See How to fix? for Alpine:3.21 relevant fixed versions and status.

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Insecure handling of symlinks with --links and --metadata in rclone while copying to local disk allows unprivileged users to indirectly modify ownership and permissions on symlink target files when a superuser or privileged process performs a copy. This vulnerability could enable privilege escalation and unauthorized access to critical system files, compromising system integrity, confidentiality, and availability. This vulnerability is fixed in 1.68.2.