GNOME Autoar: User-assisted execution of arbitrary code — GLSA 202105-10

A vulnerability has been found in GNOME Autoar that could allow a remote attacker to execute arbitrary code.

Affected packages

app-arch/gnome-autoar on all architectures
Affected versions < 0.3.1
Unaffected versions >= 0.3.1

Background

GNOME Autoar provides functions and widgets for GNOME applications which want to use archives as a method to transfer directories over the internet.

Description

It was discovered that GNOME Autoar could extract files outside of the intended directory.

Impact

A remote attacker could entice a user to open a specially crafted archive using GNOME Autoar, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All GNOME Autoar users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-arch/gnome-autoar-0.3.1"
 

References

Release date
May 26, 2021

Latest revision
May 26, 2021: 1

Severity
normal

Exploitable
local, remote

Bugzilla entries