US warns of actively attacked vulnerability in UnRAR

Discussion in 'all things UNIX' started by nicolaasjan, Aug 10, 2022.

  1. nicolaasjan

    nicolaasjan Registered Member

    Joined:
    Sep 23, 2018
    Posts:
    990
    Location:
    The Netherlands
    From Dutch article:
    https://www.security.nl/posting/764219/VS waarschuwt voor actief aangevallen kwetsbaarheid in UnRAR

    Translated:
    This is a vulnerability in UnRar for Linux/UNIX.
    WinRAR and Android RAR are unaffected.

    CVE-2022-30333.
    https://nvd.nist.gov/vuln/detail/CVE-2022-30333

    Patch:
    Code:
    https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz
     
    Last edited: Aug 10, 2022
  2. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,251
    Location:
    Member state of European Union
    Good to know. It isn't compliant with FOSS definition used by Debian thus only part of opt-in non-free part of repository.
     
  3. nicolaasjan

    nicolaasjan Registered Member

    Joined:
    Sep 23, 2018
    Posts:
    990
    Location:
    The Netherlands
    I installed that patch by running 'make' and as a bonus I now also have the 'rar' executable. :)
    From now on I can create rar archives from within my archive manager (Engrampa).

    Until Linux Mint releases an update, I made a symlink 'unrar-nonfree' to point to the patched 'unrar' (in '/usr/local/bin').
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.