Multiple vulnerabilities have been found in RAR and UnRAR, the worst of which may allow attackers to execute arbitrary code.
|Package||app-arch/rar on all architectures|
|Affected versions||< 5.5.0_p20170811|
|Unaffected versions||>= 5.5.0_p20170811|
|Package||app-arch/unrar on all architectures|
|Affected versions||< 5.5.7|
|Unaffected versions||>= 5.5.7|
RAR and UnRAR provide command line interfaces for compressing and decompressing RAR files.
Multiple vulnerabilities have been discovered in RAR and UnRAR. Please review the referenced CVE identifiers for details.
A remote attacker, by enticing a user to open a specially crafted RAR, could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.
There is no known workaround at this time.
All RAR users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-arch/rar-5.5.0_p20170811"
All UnRAR users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-arch/unrar-5.5.7"