First published: Sat Sep 21 2019(Updated: )
An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME file-roller | <3.29.91 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
redhat/file-roller | <3.29.91 | 3.29.91 |
ubuntu/file-roller | <3.28.0-1ubuntu1.1 | 3.28.0-1ubuntu1.1 |
ubuntu/file-roller | <3.30.0-1 | 3.30.0-1 |
ubuntu/file-roller | <3.16.5-0ubuntu1.3 | 3.16.5-0ubuntu1.3 |
debian/file-roller | 3.38.1-1 43.0-1 44.3-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2019-16680.
The severity level of CVE-2019-16680 is medium with a CVSS score of 4.3.
The software versions affected by CVE-2019-16680 are file-roller versions up to 3.29.91.
To fix CVE-2019-16680, update file-roller to version 3.30.0-1 or higher.
More information about CVE-2019-16680 can be found at the following references: [1](https://bugzilla.gnome.org/show_bug.cgi?id=794337), [2](https://bugzilla.redhat.com/show_bug.cgi?id=1767594), [3](https://gitlab.gnome.org/GNOME/file-roller/commit/57268e51e59b61c9e3125eb0f65551c7084297e2).