CVE-2021-28650

NameCVE-2021-28650
Descriptionautoar-extractor.c in GNOME gnome-autoar before 0.3.1, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink in certain complex situations. NOTE: this issue exists because of an incomplete fix for CVE-2020-36241.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow
Debian Bugs985391

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnome-autoar (PTS)stretch0.1.1-4fixed
buster0.2.3-2fixed
bullseye0.2.4-3vulnerable
bookworm, sid0.4.0-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnome-autoarsourceexperimental0.3.1-1
gnome-autoarsourcestretch(not affected)
gnome-autoarsourcebuster(not affected)
gnome-autoarsource(unstable)(unfixed)985391

Notes

[bullseye] - gnome-autoar <no-dsa> (Minor issue)
[buster] - gnome-autoar <not-affected> (Incomplete fix for CVE-2020-36241 not applied)
[stretch] - gnome-autoar <not-affected> (Incomplete fix for CVE-2020-36241 not applied)
https://gitlab.gnome.org/GNOME/gnome-autoar/-/issues/12
Fixed by: https://gitlab.gnome.org/GNOME/gnome-autoar/-/commit/8109c368c6cfdb593faaf698c2bf5da32bb1ace4
Issue exists because of an incomplete fix for CVE-2020-36241.
Two followup/regression patches:
https://gitlab.gnome.org/GNOME/gnome-autoar/-/commit/135053d5d3a0320891cf2e2ad4684b648bb46fc8
https://gitlab.gnome.org/GNOME/gnome-autoar/-/commit/b9590ab77b70e74e9deffd2af6c32908dc3c5aaf

Search for package or bug name: Reporting problems