From $URL: When an archive includes an executable shell script and the user chose to open files in their associated applications, clicking on those scripts runs them. As there is no indication (except the small icon in some cases) of the file being executable, this is highly misleading and even dangerous.
@ Maintainer(s): Patched version not yet released; Patches for both versions in Gentoo repository available, see $URL.
Bumped 16.12.0-r1 and 16.08.3-r1 with the fix and verified with the upstream tar.gz example, dropped affected 16.12.0. 16.08.3-r1 should then be stabilised.
@ Maintainer(s): Thank you for the rev bump! @ Arches, please test and mark stable: =kde-apps/ark-16.08.3-r1
amd64 stable
CVE assignment: http://seclists.org/oss-sec/2017/q1/46
(In reply to Thomas Deutschmann from comment #5) > CVE assignment: http://seclists.org/oss-sec/2017/q1/46 So upstream is not trying to embargo. Good enough for me.
x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one.
Cleanup done.
New GLSA request filed.
This issue was resolved and addressed in GLSA 201701-69 at https://security.gentoo.org/glsa/201701-69 by GLSA coordinator Thomas Deutschmann (whissi).