Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2020-28924

Published: 19 November 2020

An issue was discovered in Rclone before 1.53.3. Due to the use of a weak random number generator, the password generator has been producing weak passwords with much less entropy than advertised. The suggested passwords depend deterministically on the time the second rclone was started. This limits the entropy of the passwords enormously. These passwords are often used in the crypt backend for encryption of data. It would be possible to make a dictionary of all possible passwords with about 38 million entries per password length. This would make decryption of secret material possible with a plausible amount of effort. NOTE: all passwords generated by affected versions should be changed.

Notes

AuthorNote
sbeattie
debian asserts this was introduced in upstream in
193c30d57038017370594d5bc8ee9bc32580ddf2 v1.49; needs verification.

Priority

Medium

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
rclone
Launchpad, Ubuntu, Debian
bionic Needs triage

focal Needs triage

groovy Ignored
(end of life)
hirsute Not vulnerable
(1.53.3-1)
impish Not vulnerable
(1.53.3-1)
jammy Not vulnerable
(1.53.3-1)
kinetic Not vulnerable
(1.53.3-1)
lunar Not vulnerable
(1.53.3-1)
mantic Not vulnerable
(1.53.3-1)
trusty Does not exist

upstream
Released (1.53.3-1)
xenial Does not exist

Patches:
upstream: https://github.com/rclone/rclone/commit/4c215cc81ec6143ae3c64633700cb341ca28df2d
upstream: https://github.com/rclone/rclone/commit/c8b11d27e1fe261fdfba6b8910fda69356c9c777

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N