1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-11-20 00:21:35 +00:00

security/vuxml: document vulnerability in ark

This commit is contained in:
Tobias C. Berner 2020-08-28 05:15:49 +00:00
parent 59a19c1c98
commit fc5c7433e8
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=546705

View File

@ -58,6 +58,50 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="38fdf07b-e8ec-11ea-8bbe-e0d55e2a8bf9">
<topic>ark -- extraction outside of extraction directory</topic>
<affects>
<package>
<name>ark</name>
<range><lt>20.08.0_1</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Albert Astals Cid reports:</p>
<blockquote cite="https://kde.org/info/security/advisory-20200827-1.txt">
<h3>Overview</h3>
<p>A maliciously crafted TAR archive containing symlink entries
would install files anywhere in the user's home directory upon extraction.</p>
<h3>Proof of concept</h3>
<p>For testing, an example of malicious archive can be found at
<a href="https://github.com/jwilk/traversal-archives/releases/download/0/dirsymlink.tar">dirsymlink.tar</a>
</p>
<h3>Impact</h3>
<p>Users can unwillingly install files like a modified .bashrc, or a malicious
script placed in ~/.config/autostart.</p>
<h3>Workaround</h3>
<p>Before extracting a downloaded archive using the Ark GUI, users should inspect it
to make sure it doesn't contain symlink entries pointing outside the extraction folder.</p>
<p>The 'Extract' context menu from the Dolphin file manager shouldn't be used.</p>
<h3>Solution</h3>
<p>Ark 20.08.1 skips maliciously crafted symlinks when extracting TAR archives.</p>
<p>Alternatively, <a href="https://invent.kde.org/utilities/ark/-/commit/8bf8c5ef07b0ac5e914d752681e470dea403a5bd">8bf8c5ef07b0ac5e914d752681e470dea403a5bd</a> can be applied to previous releases.</p>
<h3>Credits</h3>
<p>Thanks to Fabian Vogt for reporting this issue and for fixing it.</p>
</blockquote>
</body>
</description>
<references>
<url>https://kde.org/info/security/advisory-20200827-1.txt</url>
<cvename>CVE-2020-24654</cvename>
</references>
<dates>
<discovery>2020-08-27</discovery>
<entry>2020-08-28</entry>
</dates>
</vuln>
<vuln vid="ee261034-b95e-4479-b947-08b0877e029f">
<topic>php72 -- use of freed hash key</topic>
<affects>