14a5f8f266
Archive formats such as .zip files are generally susceptible to so-called "traversal attacks". This allows an attacker to craft an archive that writes to unexpected locations of the file system (e.g., /etc/shadow) if an unspecting root user were to unpack a malicious archive. This patch neutralizes absolute paths such as /tmp/moo and deeply relative paths such as dummy/../../../../../../../../../../tmp/moo The Debian project requested CVE-2014-9485 be allocated for the first identified weakness. The fix was incomplete, resulting in a revised patch applied here. Since there wasn't an updated version released by Debian with the incomplete fix, I suggest we use this CVE to identify both issues. Link: https://security.snyk.io/research/zip-slip-vulnerability Link: https://bugs.debian.org/774321 Link: https://bugs.debian.org/776831 Link: https://nvd.nist.gov/vuln/detail/CVE-2014-9485 Reported-by: Jakub Wilk <jwilk@debian.org> Fixed-by: Michael Gilbert <mgilbert@debian.org> |
||
---|---|---|
.. | ||
configure.ac | ||
crypt.h | ||
ioapi.c | ||
ioapi.h | ||
iowin32.c | ||
iowin32.h | ||
make_vms.com | ||
Makefile | ||
Makefile.am | ||
miniunz.c | ||
miniunzip.1 | ||
MiniZip64_Changes.txt | ||
MiniZip64_info.txt | ||
minizip.1 | ||
minizip.c | ||
minizip.pc.in | ||
mztools.c | ||
mztools.h | ||
unzip.c | ||
unzip.h | ||
zip.c | ||
zip.h |