mirror of
https://git.FreeBSD.org/ports.git
synced 2024-11-20 00:21:35 +00:00
security/vuxml: document vulnerability in ark
This commit is contained in:
parent
59a19c1c98
commit
fc5c7433e8
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=546705
@ -58,6 +58,50 @@ Notes:
|
||||
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="38fdf07b-e8ec-11ea-8bbe-e0d55e2a8bf9">
|
||||
<topic>ark -- extraction outside of extraction directory</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>ark</name>
|
||||
<range><lt>20.08.0_1</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>Albert Astals Cid reports:</p>
|
||||
<blockquote cite="https://kde.org/info/security/advisory-20200827-1.txt">
|
||||
<h3>Overview</h3>
|
||||
<p>A maliciously crafted TAR archive containing symlink entries
|
||||
would install files anywhere in the user's home directory upon extraction.</p>
|
||||
<h3>Proof of concept</h3>
|
||||
<p>For testing, an example of malicious archive can be found at
|
||||
<a href="https://github.com/jwilk/traversal-archives/releases/download/0/dirsymlink.tar">dirsymlink.tar</a>
|
||||
</p>
|
||||
<h3>Impact</h3>
|
||||
<p>Users can unwillingly install files like a modified .bashrc, or a malicious
|
||||
script placed in ~/.config/autostart.</p>
|
||||
<h3>Workaround</h3>
|
||||
<p>Before extracting a downloaded archive using the Ark GUI, users should inspect it
|
||||
to make sure it doesn't contain symlink entries pointing outside the extraction folder.</p>
|
||||
<p>The 'Extract' context menu from the Dolphin file manager shouldn't be used.</p>
|
||||
<h3>Solution</h3>
|
||||
<p>Ark 20.08.1 skips maliciously crafted symlinks when extracting TAR archives.</p>
|
||||
<p>Alternatively, <a href="https://invent.kde.org/utilities/ark/-/commit/8bf8c5ef07b0ac5e914d752681e470dea403a5bd">8bf8c5ef07b0ac5e914d752681e470dea403a5bd</a> can be applied to previous releases.</p>
|
||||
<h3>Credits</h3>
|
||||
<p>Thanks to Fabian Vogt for reporting this issue and for fixing it.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<url>https://kde.org/info/security/advisory-20200827-1.txt</url>
|
||||
<cvename>CVE-2020-24654</cvename>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2020-08-27</discovery>
|
||||
<entry>2020-08-28</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="ee261034-b95e-4479-b947-08b0877e029f">
|
||||
<topic>php72 -- use of freed hash key</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user