Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-11736

Опубликовано: 13 апр. 2020
Источник: debian
EPSS Низкий

Описание

fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
file-rollerfixed3.36.2-1package
file-rollerfixed3.30.1-2+deb10u1busterpackage
file-rollerfixed3.22.3-1+deb9u2stretchpackage

Примечания

  • https://gitlab.gnome.org/GNOME/file-roller/-/commit/21dfcdbfe258984db89fb65243a1a888924e45a0

EPSS

Процентиль: 19%
0.0006
Низкий

Связанные уязвимости

CVSS3: 3.9
ubuntu
больше 5 лет назад

fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.

CVSS3: 3.9
redhat
больше 5 лет назад

fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.

CVSS3: 3.9
nvd
больше 5 лет назад

fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.

suse-cvrf
больше 5 лет назад

Security update for file-roller

CVSS3: 3.9
github
больше 3 лет назад

fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.

EPSS

Процентиль: 19%
0.0006
Низкий