[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-04 Thread vishnunaini
Rik only pushed an update for 20.10 Beta i.e groovy as he only has access to the development version. For the LTS release 20.04, the patch has not been released as it can only be pushed by the Ubuntu security team or the release sponsors team. I have just now added the ubuntu-security sponsors to

[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-06 Thread vishnunaini
Upstream has included the below test archive in the original advisory. Upon trying to open the test archive in ark, a warning will show below the menu bar. Proof of concept For testing, an example of malicious archive can be found at https://github.com/jwilk/traversal-archives/re

[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-06 Thread vishnunaini
I have tested steve's focal build from security-proposed and was able to succesfully validate the fix i.e. warning for the PoC. I have attached a screenshot of the warning when trying to open the PoC ** Attachment added: "ark_fix_test.png" https://bugs.launchpad.net/ubuntu/+source/ark/+bug/1

[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-07 Thread vishnunaini
** Attachment removed: "ark_fix_test.png" https://bugs.launchpad.net/ubuntu/+source/ark/+bug/1889672/+attachment/5399333/+files/ark_fix_test.png -- You received this bug notification because you are a member of Kubuntu Bugs, which is subscribed to ark in Ubuntu. https://bugs.launchpad.net/bug

[Bug 1889672] Re: KDE Project Security Advisory: Ark: maliciously crafted archive can install files outside the extraction directory.

2020-08-07 Thread vishnunaini
Code went through a major refactor after xenial to integrate with updated Qt. See https://phabricator.kde.org/T2704 The refactor for this function was -void Job::onEntry(const ArchiveEntry & archiveEntry) +void Job::onEntry(Archive::Entry *entry) { -emit newEntry(archiveEntry); +emit new

[Bug 1668552] Re: KDE Project Security Advisory: ktnef: Directory Traversal

2017-03-01 Thread vishnunaini
debdiff for yakkety is included in the attachment. ** Attachment added: "yakkety-debdiff" https://bugs.launchpad.net/ubuntu/+source/ktnef/+bug/1668552/+attachment/4828791/+files/yakkety-debdiff ** Changed in: ktnef (Ubuntu Xenial) Status: New => Confirmed ** Changed in: ktnef (Ubuntu

[Bug 1668552] Re: KDE Project Security Advisory: ktnef: Directory Traversal

2017-03-01 Thread vishnunaini
Xenial is in kdepim not ktnef. ** Changed in: ktnef (Ubuntu Xenial) Status: Confirmed => New -- You received this bug notification because you are a member of Kubuntu Bugs, which is subscribed to kdepim in Ubuntu. https://bugs.launchpad.net/bugs/1668552 Title: KDE Project Security Advi

[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-01 Thread vishnunaini
Added kio-yakkety-debdiff.patch ** Changed in: kde4libs (Ubuntu Yakkety) Status: New => Confirmed ** Changed in: kio (Ubuntu Yakkety) Status: New => Confirmed ** Patch added: "kio-yakkety-debdiff.patch" https://bugs.launchpad.net/ubuntu/+source/kio/+bug/1668871/+attachment/4828

[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-01 Thread vishnunaini
Added kde4libs-yakkety-debdiff.patch ** Patch added: "kde4libs-yakkety-debdiff.patch" https://bugs.launchpad.net/ubuntu/+source/kio/+bug/1668871/+attachment/4828811/+files/kde4libs-yakkety-debdiff.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is s

[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-01 Thread vishnunaini
Why did the kde4libs amd64 build in ubuntu-security-proposed fail? It built fine in my ppa. my ppa: https://launchpad.net/~visred/+archive/ubuntu/rel-ppa/+packages https://launchpad.net/~visred/+archive/ubuntu/rel-ppa/+build/12070850 ubuntu-security-proposed build: https://launchpad.net/~ubuntu-

[Bug 1668552] Re: KDE Project Security Advisory: ktnef: Directory Traversal

2017-03-02 Thread vishnunaini
debdiff for ktnef in xenial is attached. kdepim also needs to patched both in xenial and trusty. ** Attachment added: "ktnef-xenial-debdiff" https://bugs.launchpad.net/ubuntu/+source/ktnef/+bug/1668552/+attachment/4829858/+files/ktnef-xenial-debdiff -- You received this bug notification bec

[Bug 1668552] Re: KDE Project Security Advisory: ktnef: Directory Traversal

2017-03-02 Thread vishnunaini
I cannot make debdiffs' for kdepim as I am not sure if the patch is compatible. Someone familiar with the code should patch it. ** Changed in: ktnef (Ubuntu Xenial) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed

[Bug 1641700] Re: untrusted code execution using NES music file play using gstreamer NES CPU emulation CESA-2016-0001

2016-11-14 Thread vishnunaini
I am not going to touch the code myself but I will post a debdiff if upstream debian updates it in wheezy. But I still request the security team to look at it because this problem exists in a default install and also could compromise the system by just opening nautilus. -- You received this bug

[Bug 1641380] Re: chromium-browser: ERR_CERTIFICATE_TRANSPARENCY_REQUIRED for Symantec certs

2016-11-14 Thread vishnunaini
This is not a bug with chrome. It is a bug with symantec's certificate issuance systems. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1641380 Title: chromium-browser: ERR_CERTIFICATE_TRANSPARENCY_R

[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-02 Thread vishnunaini
debdiff for kde4libs in xenial is attached. ** Attachment added: "kde4libs-xenial-debdiff" https://bugs.launchpad.net/ubuntu/+source/kio/+bug/1668871/+attachment/4829903/+files/kde4libs-xenial-debdiff ** Changed in: kio (Ubuntu Xenial) Status: New => Confirmed ** Changed in: kde4libs

[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-02 Thread vishnunaini
debdiff for kio in xenial is attached. ** Attachment added: "kio-xenial-debdiff" https://bugs.launchpad.net/ubuntu/+source/kio/+bug/1668871/+attachment/4829901/+files/kio-xenial-debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubu

[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-02 Thread vishnunaini
** Changed in: kde4libs (Ubuntu Zesty) Status: New => Confirmed ** Changed in: kio (Ubuntu Zesty) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1668871 Title:

[Bug 1668871] Re: kio: Information Leak when accessing https when using a malicious PAC file

2017-03-08 Thread vishnunaini
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2017-6410 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1668871 Title: kio: Information Leak when accessing https when using a malici

[Bug 1638922] [NEW] tar : CVE-2016-6321 not patched in stable

2016-11-03 Thread vishnunaini
Public bug reported: CVE-2016-6321 path name extract bypass vulnerability is not patched in stable releases of yakkety, xenial and other supported releases. The maintainer appears to have only pushed the patch to zesty proposed. Please push the patch for the stable releases as this bug could hav

[Bug 1638922] Re: [needs-packaging] tar : CVE-2016-6321 not patched in stable

2016-11-03 Thread vishnunaini
I removed the needs-packaging tag. Wasn't aware that it is only for new packages. ** Tags removed: needs-packaging -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1638922 Title: [needs-packaging] tar

[Bug 1893465] [NEW] KDE Project Security Advisory: Ark: maliciously crafted TAR archive with symlinks can install files outside the extraction directory.

2020-08-28 Thread vishnunaini
*** This bug is a security vulnerability *** Public security bug reported: I have included a debdiff imported from upstream for the below security advisory for ark. I have tested the patch in ppa with the sample archive issued in the advisory and can confirm it works without any noticeable issue

[Bug 1893465] Re: KDE Project Security Advisory: Ark: maliciously crafted TAR archive with symlinks can install files outside the extraction directory.

2020-08-28 Thread vishnunaini
All previous and current releases are possibly affected. The above debdiff is compatible with focal and bionic which are affected. Groovy can be updated to the latest upstream by the maintainer. The nature of impact of this bug on xenial is unknown as the code in xenial is very different and upst

[Bug 1968287] Re: loopback addresses disappear after running "netplan apply" multiple times

2022-05-26 Thread vishnunaini
** Changed in: netplan.io (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1968287 Title: loopback addresses disappear after running "netplan apply" multiple