[ASA-201802-4] plasma-workspace: arbitrary command execution

2018-02-09 Thread Jelle van der Waa
Arch Linux Security Advisory ASA-201802-4
=

Severity: High
Date: 2018-02-09
CVE-ID  : CVE-2018-6791
Package : plasma-workspace
Type: arbitrary command execution
Remote  : No
Link: https://security.archlinux.org/AVG-607

Summary
===

The package plasma-workspace before version 5.12.0-1 is vulnerable to
arbitrary command execution.

Resolution
==

Upgrade to 5.12.0-1.

# pacman -Syu "plasma-workspace>=5.12.0-1"

The problem has been fixed upstream in version 5.12.0.

Workaround
==

Mount removable devices with Dolphin instead of the device notifier.

Description
===

When a vfat thumbdrive which contains `` or $() in its volume label is
plugged and mounted trough the device notifier, it's interpreted as a
shell command, leaving a possibility of arbitrary commands execution.
an example of offending volume label is "$(touch b)" which will create
a file called b in the home folder.

Impact
==

A local attacker is able to execute arbitrary commands on the affected
system by inserting and mounting a specially crafted thumbdrive.

References
==

https://www.kde.org/info/security/advisory-20180208-2.txt
https://security.archlinux.org/CVE-2018-6791


signature.asc
Description: PGP signature


[ASA-201802-4] plasma-workspace: arbitrary command execution

2018-02-09 Thread Jelle van der Waa
[ASA-201802-4] plasma-workspace: arbitrary command execution
Arch Linux Security Advisory ASA-201802-4
=

Severity: High
Date: 2018-02-09
CVE-ID  : CVE-2018-6791
Package : plasma-workspace
Type: arbitrary command execution
Remote  : No
Link: https://security.archlinux.org/AVG-607

Summary
===

The package plasma-workspace before version 5.12.0-1 is vulnerable to
arbitrary command execution.

Resolution
==

Upgrade to 5.12.0-1.

# pacman -Syu "plasma-workspace>=5.12.0-1"

The problem has been fixed upstream in version 5.12.0.

Workaround
==

Mount removable devices with Dolphin instead of the device notifier.

Description
===

When a vfat thumbdrive which contains `` or $() in its volume label is
plugged and mounted trough the device notifier, it's interpreted as a
shell command, leaving a possibility of arbitrary commands execution.
an example of offending volume label is "$(touch b)" which will create
a file called b in the home folder.

Impact
==

A local attacker is able to execute arbitrary commands on the affected
system by inserting and mounting a specially crafted thumbdrive.

References
==

https://www.kde.org/info/security/advisory-20180208-2.txt
https://security.archlinux.org/CVE-2018-6791


signature.asc
Description: PGP signature


[ASA-201802-3] go-pie: arbitrary code execution

2018-02-09 Thread Jelle van der Waa
Arch Linux Security Advisory ASA-201802-3
=

Severity: High
Date: 2018-02-09
CVE-ID  : CVE-2018-6574
Package : go-pie
Type: arbitrary code execution
Remote  : Yes
Link: https://security.archlinux.org/AVG-606

Summary
===

The package go-pie before version 1.9.4-1 is vulnerable to arbitrary
code execution.

Resolution
==

Upgrade to 1.9.4-1.

# pacman -Syu "go-pie>=1.9.4-1"

The problem has been fixed upstream in version 1.9.4.

Workaround
==

None.

Description
===

Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before
Go 1.10rc2 allow "go get" remote command execution during source code
build, by leveraging the gcc or clang plugin feature, because -fplugin=
and -plugin= arguments were not blocked.

Impact
==

A remote attacker is able to trick the “go get” command into executing
arbitrary code by passing a maliciously-crafted flag to the gcc or
clang backends.

References
==

https://github.com/golang/go/issues/23672
https://go.googlesource.com/go/+/867fb18b6d5bc73266b68c9a695558a04e060a8a
https://groups.google.com/forum/m/#!msg/golang-nuts/Gbhh1NxAjMU/dfW69X50AgAJ
https://security.archlinux.org/CVE-2018-6574


signature.asc
Description: PGP signature