Directory Traversal Affecting fribidi package, versions <0:1.0.2-1.el7
Threat Intelligence
EPSS
0.18% (57th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-FRIBIDI-2127379
- published 26 Jul 2021
- disclosed 13 Jul 2018
Introduced: 13 Jul 2018
CVE-2018-14036 Open this link in a new tabHow to fix?
Upgrade Centos:7 fribidi to version 0:1.0.2-1.el7 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream fribidi package and not the fribidi package as distributed by Centos.
See How to fix? for Centos:7 relevant fixed versions and status.
Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c.
References
- http://www.securityfocus.com/bid/104757
- https://access.redhat.com/security/cve/CVE-2018-14036
- https://bugs.freedesktop.org/show_bug.cgi?id=107085
- https://bugzilla.suse.com/show_bug.cgi?id=1099699
- https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a
- http://www.openwall.com/lists/oss-security/2018/07/02/2
- https://access.redhat.com/errata/RHSA-2018:3140