Multiple vulnerabilities have been found in RAR and UnRAR, the worst of which may allow attackers to execute arbitrary code.
Package | app-arch/rar on all architectures |
---|---|
Affected versions | < 5.5.0_p20170811 |
Unaffected versions | >= 5.5.0_p20170811 |
Package | app-arch/unrar on all architectures |
---|---|
Affected versions | < 5.5.7 |
Unaffected versions | >= 5.5.7 |
RAR and UnRAR provide command line interfaces for compressing and decompressing RAR files.
Multiple vulnerabilities have been discovered in RAR and UnRAR. Please review the referenced CVE identifiers for details.
A remote attacker, by enticing a user to open a specially crafted RAR, could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.
There is no known workaround at this time.
All RAR users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-arch/rar-5.5.0_p20170811"
All UnRAR users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-arch/unrar-5.5.7"