![]() ![]() Solution Update the affected unzip package. sudo apt-get install unzip After installing the unzip utility, if you want to extract to a particular destination folder, you can use: unzip file.zip -d destinationfolder If the source and destination directories are the same, you can simply do: unzip file. (CVE-2022-0529, CVE-2022-0530) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. zip files Details It was discovered that unzip did not properly handle unicode strings under certain circumstances. converting wide strings to local strings. Ubuntu 14.04 ESM Packages unzip - De-archiver for. ( CVE-2021-4217) It was discovered that unzip did not properly perform bounds checking while. zip file, an attacker could possibly use this issue to cause unzip to crash, resulting in a denial of service, or possibly execute arbitrary code. Go to the folder where your zip file is stored. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution. If a user were tricked into opening a specially crafted. How to unzip a zip file on Ubuntu using GUI Open the file manager. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. (CVE-2021-4217) - A flaw was found in Unzip. This software is used to unpack software that has been packed in with the InfoZIP/PKZIP. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution. Once the package has been installed, you can use the following command syntax to extract files from a zip archive: unzip archive-name.zip. On Red Hat, Fedora, and CentOS: sudo dnf install unzip. On Arch Linux and Manjaro: sudo pacman -S unzip. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. On Ubuntu, Debian, and Linux Mint: sudo apt install unzip. Description The remote Ubuntu 16.04 ESM / 18.04 LTS / 20.04 LTS / 22.04 LTS host has a package installed that is affected by multiple vulnerabilities as referenced in the USN-5673-1 advisory. Synopsis The remote Ubuntu host is missing one or more security updates. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |