This is an automated email from the ASF dual-hosted git repository.

gaurava pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/hadoop-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 7dc40cee7d Add details of CVE-2022-26612 (#38)
7dc40cee7d is described below

commit 7dc40cee7df673f7a96b1fdb2f40e027ffc14ea3
Author: Gautham B A <[email protected]>
AuthorDate: Wed Apr 20 23:26:33 2022 +0530

    Add details of CVE-2022-26612 (#38)
    
    * Added the details of
      CVE-2022-26612 to
      cve_list page.
---
 content/cve_list.html | 15 +++++++++++++++
 content/index.xml     |  2 +-
 src/cve_list.md       | 15 +++++++++++++++
 3 files changed, 31 insertions(+), 1 deletion(-)

diff --git a/content/cve_list.html b/content/cve_list.html
index 4797153e88..501eb6cbb6 100644
--- a/content/cve_list.html
+++ b/content/cve_list.html
@@ -169,6 +169,21 @@ One paragraph summary goes here. Don't need nuts-and-bolts 
detail, just enough f
 - **Reported Date**:
 - **Issue Announced**:
 -->
+<h2 
id="cve-2022-26612httpcvemitreorgcgi-bincvenamecginamecve-2022-26612-arbitrary-file-write-during-untar-on-windows"><a
 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26612";>CVE-2022-26612</a>
 Arbitrary file write during untar on Windows</h2>
+<p>In Apache Hadoop, The <code>unTar</code> function uses 
<code>unTarUsingJava</code> function on Windows and the built-in tar utility on 
Unix and other OSes.  As a result, a TAR entry may create a symlink under the 
expected extraction directory which points to an external directory. A 
subsequent TAR entry may extract an arbitrary file into the external directory 
using the symlink name. This however would be caught by the same 
<code>targetDirPath</code> check on Unix because of the <code [...]
+<p>Users of the affected versions should apply either of the following 
mitigations:</p>
+<ul>
+<li>Do not run any of the YARN daemons as a user possessing the permissions to 
create symlinks on Windows.</li>
+<li>Do not use symlinks in the tar file.</li>
+</ul>
+<ul>
+<li><strong>Versions affected</strong>: Versions below 3.2.3, 3.3.2</li>
+<li><strong>Fixed versions</strong>: 3.2.3, 3.3.3, 3.4 onwards</li>
+<li><strong>Impact</strong>: file write to arbitrary path in Windows</li>
+<li><strong>Reporter</strong>: A member of GitHub Security Lab, <a 
href="https://github.com/JarLob";>Jaroslav Lobačevski</a></li>
+<li><strong>Reported Date</strong>: 2022/02/09</li>
+<li><strong>Issue Announced</strong>: 2022/04/7 (<a 
href="https://lists.apache.org/thread/wps21pzjl1myxw23yb466y9yofv104yl";>general@hadoop</a>)</li>
+</ul>
 <h2 
id="cve-2020-9492httpcvemitreorgcgi-bincvenamecginamecve-2020-9492-apache-hadoop-potential-privilege-escalation"><a
 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9492";>CVE-2020-9492</a>
 Apache Hadoop Potential privilege escalation</h2>
 <p>WebHDFS client might send SPNEGO authorization header to remote URL
 without proper verification. A crafty user can trigger services to
diff --git a/content/index.xml b/content/index.xml
index b9136fa5e6..ddabf6368c 100644
--- a/content/index.xml
+++ b/content/index.xml
@@ -1365,7 +1365,7 @@ The Apache Hadoop software library is a framework that 
allows for the distribute
       <guid>https://hadoop.apache.org/cve_list.html</guid>
       <description>This page lists security fixes that the Hadoop PMC felt 
warranted a CVE. If you think something is missing from this list or if you 
think the set of impacted or fixed versions is incomplete then please ask on 
the Security list.
 CVEs are presented in most-recent-first order of announcement.
-CVE-2020-9492 Apache Hadoop Potential privilege escalation WebHDFS client 
might send SPNEGO authorization header to remote URL without proper 
verification. A crafty user can trigger services to send server credentials to 
a webhdfs path for capturing the service principal.</description>
+CVE-2022-26612 Arbitrary file write during untar on Windows In Apache Hadoop, 
The unTar function uses unTarUsingJava function on Windows and the built-in tar 
utility on Unix and other OSes.</description>
     </item>
     
     <item>
diff --git a/src/cve_list.md b/src/cve_list.md
index 40b17dbfdd..bd7961fbfd 100644
--- a/src/cve_list.md
+++ b/src/cve_list.md
@@ -37,6 +37,21 @@ One paragraph summary goes here. Don't need nuts-and-bolts 
detail, just enough f
 - **Issue Announced**:
 -->
 
+## 
[CVE-2022-26612](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26612) 
Arbitrary file write during untar on Windows
+
+In Apache Hadoop, The `unTar` function uses `unTarUsingJava` function on 
Windows and the built-in tar utility on Unix and other OSes.  As a result, a 
TAR entry may create a symlink under the expected extraction directory which 
points to an external directory. A subsequent TAR entry may extract an 
arbitrary file into the external directory using the symlink name. This however 
would be caught by the same `targetDirPath` check on Unix because of the 
`getCanonicalPath` call. However on Windo [...]
+
+Users of the affected versions should apply either of the following 
mitigations:
+* Do not run any of the YARN daemons as a user possessing the permissions to 
create symlinks on Windows.
+* Do not use symlinks in the tar file.
+
+- **Versions affected**: Versions below 3.2.3, 3.3.2
+- **Fixed versions**: 3.2.3, 3.3.3, 3.4 onwards
+- **Impact**: file write to arbitrary path in Windows
+- **Reporter**: A member of GitHub Security Lab, [Jaroslav 
Lobačevski](https://github.com/JarLob)
+- **Reported Date**: 2022/02/09
+- **Issue Announced**: 2022/04/7 
([general@hadoop](https://lists.apache.org/thread/wps21pzjl1myxw23yb466y9yofv104yl))
+
 ## 
[CVE-2020-9492](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9492) 
Apache Hadoop Potential privilege escalation
 
 WebHDFS client might send SPNEGO authorization header to remote URL


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to