svn commit: r546705 - head/security/vuxml
Tobias C. Berner
tcberner at FreeBSD.org
Fri Aug 28 05:15:50 UTC 2020
Author: tcberner
Date: Fri Aug 28 05:15:49 2020
New Revision: 546705
URL: https://svnweb.freebsd.org/changeset/ports/546705
Log:
security/vuxml: document vulnerability in ark
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Fri Aug 28 04:17:41 2020 (r546704)
+++ head/security/vuxml/vuln.xml Fri Aug 28 05:15:49 2020 (r546705)
@@ -58,6 +58,50 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="38fdf07b-e8ec-11ea-8bbe-e0d55e2a8bf9">
+ <topic>ark -- extraction outside of extraction directory</topic>
+ <affects>
+ <package>
+ <name>ark</name>
+ <range><lt>20.08.0_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Albert Astals Cid reports:</p>
+ <blockquote cite="https://kde.org/info/security/advisory-20200827-1.txt">
+ <h3>Overview</h3>
+ <p>A maliciously crafted TAR archive containing symlink entries
+ would install files anywhere in the user's home directory upon extraction.</p>
+ <h3>Proof of concept</h3>
+ <p>For testing, an example of malicious archive can be found at
+ <a href="https://github.com/jwilk/traversal-archives/releases/download/0/dirsymlink.tar">dirsymlink.tar</a>
+ </p>
+ <h3>Impact</h3>
+ <p>Users can unwillingly install files like a modified .bashrc, or a malicious
+ script placed in ~/.config/autostart.</p>
+ <h3>Workaround</h3>
+ <p>Before extracting a downloaded archive using the Ark GUI, users should inspect it
+ to make sure it doesn't contain symlink entries pointing outside the extraction folder.</p>
+ <p>The 'Extract' context menu from the Dolphin file manager shouldn't be used.</p>
+ <h3>Solution</h3>
+ <p>Ark 20.08.1 skips maliciously crafted symlinks when extracting TAR archives.</p>
+ <p>Alternatively, <a href="https://invent.kde.org/utilities/ark/-/commit/8bf8c5ef07b0ac5e914d752681e470dea403a5bd">8bf8c5ef07b0ac5e914d752681e470dea403a5bd</a> can be applied to previous releases.</p>
+ <h3>Credits</h3>
+ <p>Thanks to Fabian Vogt for reporting this issue and for fixing it.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://kde.org/info/security/advisory-20200827-1.txt</url>
+ <cvename>CVE-2020-24654</cvename>
+ </references>
+ <dates>
+ <discovery>2020-08-27</discovery>
+ <entry>2020-08-28</entry>
+ </dates>
+ </vuln>
+
<vuln vid="ee261034-b95e-4479-b947-08b0877e029f">
<topic>php72 -- use of freed hash key</topic>
<affects>
More information about the svn-ports-all
mailing list