FS#44171 - [unzip][CVE-2014-9636] Denial of Service
Attached to Project:
Arch Linux
Opened by Christian Rebischke (Shibumi) - Friday, 13 March 2015, 15:09 GMT
Last edited by Gaetan Bisson (vesath) - Sunday, 15 March 2015, 05:50 GMT
Opened by Christian Rebischke (Shibumi) - Friday, 13 March 2015, 15:09 GMT
Last edited by Gaetan Bisson (vesath) - Sunday, 15 March 2015, 05:50 GMT
|
Details
Summary
======= unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression. References ========== https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9636 |
This task depends upon
Closed by Gaetan Bisson (vesath)
Sunday, 15 March 2015, 05:50 GMT
Reason for closing: Fixed
Additional comments about closing: unzip-6.0-10 in [extra]
Sunday, 15 March 2015, 05:50 GMT
Reason for closing: Fixed
Additional comments about closing: unzip-6.0-10 in [extra]
Also note that this patch also includes overflow-long-fsize.patch, which is a missing hardening patch fixing a single byte overflow (also applied by fedora etc).
I have 3 test cases that cause a segfault via overflow and 1 regression test, all fine with applying the attached patch onto the current state.