[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-04 Thread vishnunaini
Rik only pushed an update for 20.10 Beta i.e groovy as he only has
access to the development version.

For the LTS release 20.04, the patch has not been released as it can
only be pushed by the Ubuntu security team or the release sponsors team.

I have just now added the ubuntu-security sponsors to this bugs
subscription list as this bug seems to have missed their queue.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1889672

Title:
  KDE Project Security Advisory: Ark: maliciously crafted archive can
  install files outside the extraction directory.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ark/+bug/1889672/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-06 Thread vishnunaini
Upstream has included the below test archive in the original advisory.
Upon trying to open the test archive in ark, a warning will show below
the menu bar.

Proof of concept


For testing, an example of malicious archive can be found at
https://github.com/jwilk/traversal-archives/releases/download/0/relative2.zip

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1889672

Title:
  KDE Project Security Advisory: Ark: maliciously crafted archive can
  install files outside the extraction directory.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ark/+bug/1889672/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-06 Thread vishnunaini
I have tested steve's focal build from security-proposed and was able to
succesfully validate the fix i.e. warning for the PoC.

I have attached a screenshot of the warning when trying to open the PoC


** Attachment added: "ark_fix_test.png"
   
https://bugs.launchpad.net/ubuntu/+source/ark/+bug/1889672/+attachment/5399333/+files/ark_fix_test.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1889672

Title:
  KDE Project Security Advisory: Ark: maliciously crafted archive can
  install files outside the extraction directory.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ark/+bug/1889672/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-07 Thread vishnunaini
** Attachment removed: "ark_fix_test.png"
   
https://bugs.launchpad.net/ubuntu/+source/ark/+bug/1889672/+attachment/5399333/+files/ark_fix_test.png

-- 
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to ark in Ubuntu.
https://bugs.launchpad.net/bugs/1889672

Title:
  KDE Project Security Advisory: Ark: maliciously crafted archive can
  install files outside the extraction directory.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ark/+bug/1889672/+subscriptions

-- 
kubuntu-bugs mailing list
kubuntu-b...@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs


[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-07 Thread vishnunaini
Code went through a major refactor after xenial to integrate with
updated Qt. See https://phabricator.kde.org/T2704

The refactor for this function was

-void Job::onEntry(const ArchiveEntry & archiveEntry)
+void Job::onEntry(Archive::Entry *entry)
 {
-emit newEntry(archiveEntry);
+emit newEntry(entry);
 }

I tried to backport it to xenial but to no avail. 
There are too many function changes

The ArchievEntry->fullPath() doesn't work because archiveinterface.h doesn't 
exist.
backporting archiveinterfac.h will require a lot of refactor in the entire code

I am not familiar with the code to rewrite the actual patch itself
instead of refactoring

Even debian doesn't seem to have backported it. It seems difficult for
anyone who is not familiar with the upstream structure.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1889672

Title:
  KDE Project Security Advisory: Ark: maliciously crafted archive can
  install files outside the extraction directory.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ark/+bug/1889672/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1668552] Re: KDE Project Security Advisory: ktnef: Directory Traversal

2017-03-01 Thread vishnunaini
debdiff for yakkety is included in the attachment.

** Attachment added: "yakkety-debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/ktnef/+bug/1668552/+attachment/4828791/+files/yakkety-debdiff

** Changed in: ktnef (Ubuntu Xenial)
   Status: New => Confirmed

** Changed in: ktnef (Ubuntu Yakkety)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to kdepim in Ubuntu.
https://bugs.launchpad.net/bugs/1668552

Title:
  KDE Project Security Advisory: ktnef: Directory Traversal

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kdepim/+bug/1668552/+subscriptions

-- 
kubuntu-bugs mailing list
kubuntu-b...@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs


[Bug 1668552] Re: KDE Project Security Advisory: ktnef: Directory Traversal

2017-03-01 Thread vishnunaini
Xenial is in kdepim not ktnef.

** Changed in: ktnef (Ubuntu Xenial)
   Status: Confirmed => New

-- 
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to kdepim in Ubuntu.
https://bugs.launchpad.net/bugs/1668552

Title:
  KDE Project Security Advisory: ktnef: Directory Traversal

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kdepim/+bug/1668552/+subscriptions

-- 
kubuntu-bugs mailing list
kubuntu-b...@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs


[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-01 Thread vishnunaini
Added kio-yakkety-debdiff.patch

** Changed in: kde4libs (Ubuntu Yakkety)
   Status: New => Confirmed

** Changed in: kio (Ubuntu Yakkety)
   Status: New => Confirmed

** Patch added: "kio-yakkety-debdiff.patch"
   
https://bugs.launchpad.net/ubuntu/+source/kio/+bug/1668871/+attachment/4828810/+files/kio-yakkety-debdiff.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-01 Thread vishnunaini
Added kde4libs-yakkety-debdiff.patch

** Patch added: "kde4libs-yakkety-debdiff.patch"
   
https://bugs.launchpad.net/ubuntu/+source/kio/+bug/1668871/+attachment/4828811/+files/kde4libs-yakkety-debdiff.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-01 Thread vishnunaini
Why did the kde4libs amd64 build in ubuntu-security-proposed fail? It
built fine in my ppa.

my ppa: https://launchpad.net/~visred/+archive/ubuntu/rel-ppa/+packages

https://launchpad.net/~visred/+archive/ubuntu/rel-ppa/+build/12070850

ubuntu-security-proposed build: https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+build/12071418

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1668552] Re: KDE Project Security Advisory: ktnef: Directory Traversal

2017-03-02 Thread vishnunaini
debdiff for ktnef in xenial is attached.

kdepim also needs to patched both in xenial and trusty.

** Attachment added: "ktnef-xenial-debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/ktnef/+bug/1668552/+attachment/4829858/+files/ktnef-xenial-debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668552

Title:
  KDE Project Security Advisory: ktnef: Directory Traversal

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kdepim/+bug/1668552/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1668552] Re: KDE Project Security Advisory: ktnef: Directory Traversal

2017-03-02 Thread vishnunaini
I cannot make debdiffs' for kdepim as I am not sure if the patch is
compatible. Someone familiar with the code should patch it.

** Changed in: ktnef (Ubuntu Xenial)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668552

Title:
  KDE Project Security Advisory: ktnef: Directory Traversal

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kdepim/+bug/1668552/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1641700] Re: untrusted code execution using NES music file play using gstreamer NES CPU emulation CESA-2016-0001

2016-11-14 Thread vishnunaini
I am not going to touch the code myself but I will post a debdiff if
upstream debian updates it in wheezy.

But I still request the security team to look at it because this problem
exists in a default install and also could compromise the system by just
opening nautilus.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1641700

Title:
  untrusted code execution using NES music file play using gstreamer NES
  CPU emulation CESA-2016-0001

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gst-plugins-bad0.10/+bug/1641700/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1641380] Re: chromium-browser: ERR_CERTIFICATE_TRANSPARENCY_REQUIRED for Symantec certs

2016-11-14 Thread vishnunaini
This is not a bug with chrome. It is a bug with symantec's certificate
issuance systems.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1641380

Title:
  chromium-browser: ERR_CERTIFICATE_TRANSPARENCY_REQUIRED for Symantec
  certs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1641380/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-02 Thread vishnunaini
debdiff for kde4libs in xenial is attached.

** Attachment added: "kde4libs-xenial-debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/kio/+bug/1668871/+attachment/4829903/+files/kde4libs-xenial-debdiff

** Changed in: kio (Ubuntu Xenial)
   Status: New => Confirmed

** Changed in: kde4libs (Ubuntu Xenial)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-02 Thread vishnunaini
debdiff for kio in xenial is attached.


** Attachment added: "kio-xenial-debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/kio/+bug/1668871/+attachment/4829901/+files/kio-xenial-debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-02 Thread vishnunaini
** Changed in: kde4libs (Ubuntu Zesty)
   Status: New => Confirmed

** Changed in: kio (Ubuntu Zesty)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-08 Thread vishnunaini
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-6410

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668871

Title:
  kio: Information Leak when accessing https when using a malicious PAC
  file

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1668871/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1638922] [NEW] tar : CVE-2016-6321 not patched in stable

2016-11-03 Thread vishnunaini
Public bug reported:

CVE-2016-6321 path name extract bypass vulnerability is not patched in
stable releases of yakkety, xenial and other supported releases.

The maintainer appears to have only pushed the patch to zesty proposed.

Please push the patch for the stable releases as this bug could have
seroius implications in certain environments.

Upstream debian has already pushed the patch to stable.

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842339

https://people.canonical.com/~ubuntu-
security/cve/2016/CVE-2016-6321.html

** Affects: tar (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: cve-2016-6321 needs-packaging patch-accepted-upstream

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-6321

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1638922

Title:
  tar : CVE-2016-6321 not patched in stable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1638922/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1638922] Re: [needs-packaging] tar : CVE-2016-6321 not patched in stable

2016-11-03 Thread vishnunaini
I removed the needs-packaging tag. Wasn't aware that it is only for new
packages.

** Tags removed: needs-packaging

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1638922

Title:
  [needs-packaging] tar : CVE-2016-6321 not patched in stable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1638922/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1893465] [NEW] KDE Project Security Advisory: Ark: maliciously crafted TAR archive with symlinks can install files outside the extraction directory.

2020-08-28 Thread vishnunaini
*** This bug is a security vulnerability ***

Public security bug reported:

I have included a debdiff imported from upstream for the below security
advisory for ark.

I have tested the patch in ppa with the sample archive issued in the
advisory and can confirm it works without any noticeable issues.


KDE Project Security Advisory
=

Title:   Ark: maliciously crafted TAR archive with symlinks can install 
files outside the extraction directory.
Risk Rating: Important
CVE: CVE-2020-24654
Versions:ark <= 20.08.0
Author:  Elvis Angelaccio 
Date:27 August 2020

Overview


A maliciously crafted TAR archive containing symlink entries
would install files anywhere in the user's home directory upon extraction.

Proof of concept


For testing, an example of malicious archive can be found at
https://github.com/jwilk/traversal-archives/releases/download/0/dirsymlink.tar

Impact
==

Users can unwillingly install files like a modified .bashrc, or a malicious
script placed in ~/.config/autostart.

Workaround
==

Before extracting a downloaded archive using the Ark GUI, users should inspect 
it
to make sure it doesn't contain symlink entries pointing outside the extraction 
folder.

The 'Extract' context menu from the Dolphin file manager shouldn't be
used.

Solution


Ark 20.08.1 skips maliciously crafted symlinks when extracting TAR
archives.

Alternatively, 
https://invent.kde.org/utilities/ark/-/commit/8bf8c5ef07b0ac5e914d752681e470dea403a5bd
 can be applied to previous
releases.


Credits
===

Thanks to Fabian Vogt for reporting this issue and for fixing it.

** Affects: ark (Ubuntu)
 Importance: Undecided
 Status: New

** Patch added: 
"CVE-2020-24654-tar-symlinks-outside-extraction-directory.debdiff"
   
https://bugs.launchpad.net/bugs/1893465/+attachment/5405512/+files/CVE-2020-24654-tar-symlinks-outside-extraction-directory.debdiff

** Information type changed from Private Security to Public Security

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-24654

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893465

Title:
  KDE Project Security Advisory: Ark: maliciously crafted TAR archive
  with symlinks can install files outside the extraction directory.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ark/+bug/1893465/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1893465] Re: KDE Project Security Advisory: Ark: maliciously crafted TAR archive with symlinks can install files outside the extraction directory.

2020-08-28 Thread vishnunaini
All previous and current releases are possibly affected. 
The above debdiff is compatible with focal and bionic which are affected.
Groovy can be updated to the latest upstream by the maintainer.

The nature of impact of this bug on xenial is unknown as the code in
xenial is very different and upstream hasn't detailed it. Ark went
thorugh a significant refactor after xenial and the current upstream
patches are incompatible. I'll try to evaluate and report back if the
patch can be backported or if the bug even exists.

-- 
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to ark in Ubuntu.
https://bugs.launchpad.net/bugs/1893465

Title:
  KDE Project Security Advisory: Ark: maliciously crafted TAR archive
  with symlinks can install files outside the extraction directory.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ark/+bug/1893465/+subscriptions

-- 
kubuntu-bugs mailing list
kubuntu-b...@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs


[Bug 1968287] Re: loopback addresses disappear after running "netplan apply" multiple times

2022-05-26 Thread vishnunaini
** Changed in: netplan.io (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1968287

Title:
  loopback addresses disappear after running "netplan apply" multiple
  times

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/netplan.io/+bug/1968287/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs