A vulnerability has been found in GNOME Autoar that could allow a remote attacker to execute arbitrary code.
|Package||app-arch/gnome-autoar on all architectures|
|Affected versions||< 0.3.1|
|Unaffected versions||>= 0.3.1|
GNOME Autoar provides functions and widgets for GNOME applications which want to use archives as a method to transfer directories over the internet.
It was discovered that GNOME Autoar could extract files outside of the intended directory.
A remote attacker could entice a user to open a specially crafted archive using GNOME Autoar, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.
There is no known workaround at this time.
All GNOME Autoar users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-arch/gnome-autoar-0.3.1"