SB2025010628 - Fedora 42 update for golang-github-aws-sdk-2, golang-github-rclone-gofakes3, rclone
Published: January 6, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) UNIX symbolic link following (CVE-ID: CVE-2024-52522)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a symlink following issue when copying to local disk. A local user can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.
Successful exploitation of this vulnerability may result in privilege escalation.
2) Improper authorization (CVE-ID: CVE-2024-45337)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to improper authorization caused by improper usage of the ServerConfig.PublicKeyCallback callback. A remote attacker can bypass authorization in certain cases and gain access to the application.
Remediation
Install update from vendor's website.