Date: Fri, 28 Aug 2020 05:15:49 +0000 (UTC) From: "Tobias C. Berner" <tcberner@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r546705 - head/security/vuxml Message-ID: <202008280515.07S5Fn6L038776@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: tcberner Date: Fri Aug 28 05:15:49 2020 New Revision: 546705 URL: https://svnweb.freebsd.org/changeset/ports/546705 Log: security/vuxml: document vulnerability in ark Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Aug 28 04:17:41 2020 (r546704) +++ head/security/vuxml/vuln.xml Fri Aug 28 05:15:49 2020 (r546705) @@ -58,6 +58,50 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="38fdf07b-e8ec-11ea-8bbe-e0d55e2a8bf9"> + <topic>ark -- extraction outside of extraction directory</topic> + <affects> + <package> + <name>ark</name> + <range><lt>20.08.0_1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Albert Astals Cid reports:</p> + <blockquote cite="https://kde.org/info/security/advisory-20200827-1.txt"> + <h3>Overview</h3> + <p>A maliciously crafted TAR archive containing symlink entries + would install files anywhere in the user's home directory upon extraction.</p> + <h3>Proof of concept</h3> + <p>For testing, an example of malicious archive can be found at + <a href="https://github.com/jwilk/traversal-archives/releases/download/0/dirsymlink.tar">dirsymlink.tar</a> + </p> + <h3>Impact</h3> + <p>Users can unwillingly install files like a modified .bashrc, or a malicious + script placed in ~/.config/autostart.</p> + <h3>Workaround</h3> + <p>Before extracting a downloaded archive using the Ark GUI, users should inspect it + to make sure it doesn't contain symlink entries pointing outside the extraction folder.</p> + <p>The 'Extract' context menu from the Dolphin file manager shouldn't be used.</p> + <h3>Solution</h3> + <p>Ark 20.08.1 skips maliciously crafted symlinks when extracting TAR archives.</p> + <p>Alternatively, <a href="https://invent.kde.org/utilities/ark/-/commit/8bf8c5ef07b0ac5e914d752681e470dea403a5bd">8bf8c5ef07b0ac5e914d752681e470dea403a5bd</a> can be applied to previous releases.</p> + <h3>Credits</h3> + <p>Thanks to Fabian Vogt for reporting this issue and for fixing it.</p> + </blockquote> + </body> + </description> + <references> + <url>https://kde.org/info/security/advisory-20200827-1.txt</url> + <cvename>CVE-2020-24654</cvename> + </references> + <dates> + <discovery>2020-08-27</discovery> + <entry>2020-08-28</entry> + </dates> + </vuln> + <vuln vid="ee261034-b95e-4479-b947-08b0877e029f"> <topic>php72 -- use of freed hash key</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202008280515.07S5Fn6L038776>