CVE-2020-36241

NameCVE-2020-36241
Descriptionautoar-extractor.c in GNOME gnome-autoar through 0.2.4, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow
Debian Bugs982737

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnome-autoar (PTS)stretch0.1.1-4vulnerable
buster0.2.3-2vulnerable
bullseye, sid0.2.4-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnome-autoarsource(unstable)(unfixed)982737

Notes

[buster] - gnome-autoar <no-dsa> (Minor issue)
[stretch] - gnome-autoar <no-dsa> (Minor issue)
https://gitlab.gnome.org/GNOME/gnome-autoar/-/commit/adb067e645732fdbe7103516e506d09eb6a54429
https://gitlab.gnome.org/GNOME/gnome-autoar/-/issues/7

Search for package or bug name: Reporting problems