[gentoo-announce] [ GLSA 202105-10 ] GNOME Autoar: User-assisted execution of arbitrary code

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – Gentoo Linux Security Advisory GLSA 202105-10 – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – security.gentoo.org/ – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Severity: Normal Title: GNOME Autoar: User-assisted execution of arbitrary code Date: May 26, 2021 Bugs: #768828, #777126 ID: 202105-10
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Synopsis ========
A vulnerability has been found in GNOME Autoar that could allow a remote attacker to execute arbitrary code.
Background ==========
GNOME Autoar provides functions and widgets for GNOME applications which want to use archives as a method to transfer directories over the internet.
Affected packages =================
——————————————————————- Package / Vulnerable / Unaffected ——————————————————————- 1 app-arch/gnome-autoar < 0.3.1 >= 0.3.1
Description ===========
It was discovered that GNOME Autoar could extract files outside of the intended directory.
Impact ======
A remote attacker could entice a user to open a specially crafted archive using GNOME Autoar, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.
Workaround ==========
There is no known workaround at this time.
Resolution ==========
All GNOME Autoar users should upgrade to the latest version:
# emerge –sync # emerge –ask –oneshot –verbose “>=app-arch/gnome-autoar-0.3.1”
References ==========
[ 1 ] CVE-2020-36241 nvd.nist.gov/vuln/detail/CVE-2020-36241 [ 2 ] CVE-2021-28650 nvd.nist.gov/vuln/detail/CVE-2021-28650
Availability ============
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
security.gentoo.org/glsa/202105-10
Concerns? =========
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users’ machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at bugs.gentoo.org.
License =======
Copyright 2021 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons – Attribution / Share Alike license.
creativecommons.org/licenses/by-sa/2.5