Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 878281 (CVE-2022-20128, CVE-2022-3168) - <dev-util/android-tools-33.0.3: directory traversal during adb pull
Summary: <dev-util/android-tools-33.0.3: directory traversal during adb pull
Status: RESOLVED FIXED
Alias: CVE-2022-20128, CVE-2022-3168
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://www.openwall.com/lists/oss-se...
Whiteboard: B2 [glsa+]
Keywords:
Depends on: 878321
Blocks:
  Show dependency tree
 
Reported: 2022-10-25 16:45 UTC by John Helmert III
Modified: 2022-10-31 20:27 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-25 16:45:29 UTC
"Platform Tools v33.0.3
(https://developer.android.com/studio/releases/platform-tools)
released in August addresses two security issues in Android Debug
Bridge. Both require the adb host (e.g. the PC) to connect to a
compromised adb daemon (e.g. the mobile phone). This is a security
concern for example in automated environments or malware labs that run
arbitrary android packages by design.
I found and reported these issues to Google last December.

CVE-2022-20128:
Adb was vulnerable to directory traversal attacks during adb pull
operation. Example session (victim side):"

Please stabilize when ready.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-27 16:38:36 UTC
Please cleanup.
Comment 2 Larry the Git Cow gentoo-dev 2022-10-28 00:21:46 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=890a0363035e2cac3c3db3ddf196d64b175fc709

commit 890a0363035e2cac3c3db3ddf196d64b175fc709
Author:     Zac Medico <zmedico@gentoo.org>
AuthorDate: 2022-10-28 00:21:01 +0000
Commit:     Zac Medico <zmedico@gentoo.org>
CommitDate: 2022-10-28 00:21:12 +0000

    dev-util/android-tools: drop 31.0.3, 31.0.3_p2, 33.0.3
    
    Bug: https://bugs.gentoo.org/878281
    Signed-off-by: Zac Medico <zmedico@gentoo.org>

 dev-util/android-tools/Manifest                    |  4 --
 dev-util/android-tools/android-tools-31.0.3.ebuild | 84 ----------------------
 .../android-tools/android-tools-31.0.3_p2.ebuild   | 84 ----------------------
 dev-util/android-tools/android-tools-33.0.3.ebuild | 84 ----------------------
 4 files changed, 256 deletions(-)
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-30 03:26:35 UTC
Thanks!
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-31 14:58:24 UTC
Oops, also from URL:

CVE-2022-3168:
The reverse tunnel feature in Android Debug Bridge (adb) was
vulnerable as it allowed malicious adb daemons to open connections to
arbitrary host/ports and unix domain sockets on the host.

Example session; both sides running on Google Cloud virtual machines
for sake of demonstration. Attacker receives the access token of the
service account the victim VM is running as.

Making a '2' as arbitrary file writes can usually cause code execution via replacing things like ~/.bashrc, etc.
Comment 5 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-31 15:06:43 UTC
GLSA request filed.
Comment 6 Larry the Git Cow gentoo-dev 2022-10-31 20:26:21 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=c3fb2413d6edf1fff45b79b4539d0c1dc438c62e

commit c3fb2413d6edf1fff45b79b4539d0c1dc438c62e
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2022-10-31 20:25:11 +0000
Commit:     John Helmert III <ajak@gentoo.org>
CommitDate: 2022-10-31 20:25:51 +0000

    [ GLSA 202210-41 ] android-tools: Multiple Vulnerabilities
    
    Bug: https://bugs.gentoo.org/878281
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: John Helmert III <ajak@gentoo.org>

 glsa-202210-41.xml | 43 +++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 43 insertions(+)
Comment 7 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-31 20:27:57 UTC
GLSA released, all done!