SB2025010629 - Fedora 41 update for golang-github-aws-sdk-2, golang-github-aws-smithy, golang-github-ncw-swift-2, rclone
Published: January 6, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) UNIX symbolic link following (CVE-ID: CVE-2024-52522)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a symlink following issue when copying to local disk. A local user can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.
Successful exploitation of this vulnerability may result in privilege escalation.
2) Resource exhaustion (CVE-ID: CVE-2024-45338)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in several Parse functions. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.