EXECUTIVE SUMMARY:
Multiple vulnerabilities were identified in the apko tool APK handling functions that could lead to significant availability and integrity impacts if exploited. The first issue is an uncontrolled resource consumption vulnerability where an attacker-controlled APK stream fed into the ExpandApk function can trigger unbounded inflation of compressed data, exhausting system resources and causing process slowdowns or denial of service. A second vulnerability involves path traversal in the dirFS filesystem abstraction, allowing crafted APK content to write files or create directories outside the intended base path, potentially leading to unauthorized file system modifications. A third condition affects the Split function in the same APK processing workflow, enabling resource exhaustion through poorly bounded gzip stream handling, which again may degrade or halt the affected processs availability. These issues underline deficient input validation and resource controls in the APK parsing logic that could be abused by attackers leveraging malicious package sources or compromised repositories.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
Multiple vulnerabilities were identified in the apko tool APK handling functions that could lead to significant availability and integrity impacts if exploited. The first issue is an uncontrolled resource consumption vulnerability where an attacker-controlled APK stream fed into the ExpandApk function can trigger unbounded inflation of compressed data, exhausting system resources and causing process slowdowns or denial of service. A second vulnerability involves path traversal in the dirFS filesystem abstraction, allowing crafted APK content to write files or create directories outside the intended base path, potentially leading to unauthorized file system modifications. A third condition affects the Split function in the same APK processing workflow, enabling resource exhaustion through poorly bounded gzip stream handling, which again may degrade or halt the affected processs availability. These issues underline deficient input validation and resource controls in the APK parsing logic that could be abused by attackers leveraging malicious package sources or compromised repositories.[emaillocker id="1283"]
RECOMMENDATION:
REFERENCES:
The following reports contain further technical details:
https://github.com/advisories/GHSA-f4w5-5xv9-85f6
[/emaillocker]