Source: unzip Version: 6.0-16 Severity: important Tags: security upstream Hi,
the following vulnerability was published for unzip. CVE-2014-9913[0]: Buffer overflow in "unzip -l" via list_files() in list.c Reproducible with same PoZ.zip as generated in [1], but not the same issue. Will fill separate bug for that. $ unzip -l PoZ.zip Archive: PoZ.zip Length Date Time Name --------- ---------- ----- ---- *** buffer overflow detected ***: unzip terminated ======= Backtrace: ========= /lib/x86_64-linux-gnu/libc.so.6(+0x70bcb)[0x7efc039dabcb] /lib/x86_64-linux-gnu/libc.so.6(__fortify_fail+0x37)[0x7efc03a630e7] /lib/x86_64-linux-gnu/libc.so.6(+0xf7220)[0x7efc03a61220] /lib/x86_64-linux-gnu/libc.so.6(+0xf67d9)[0x7efc03a607d9] /lib/x86_64-linux-gnu/libc.so.6(_IO_default_xsputn+0xac)[0x7efc039debec] /lib/x86_64-linux-gnu/libc.so.6(_IO_vfprintf+0xcd3)[0x7efc039b19f3] /lib/x86_64-linux-gnu/libc.so.6(__vsprintf_chk+0x8c)[0x7efc03a6086c] /lib/x86_64-linux-gnu/libc.so.6(__sprintf_chk+0x7d)[0x7efc03a607bd] unzip[0x40f2e3] unzip[0x411004] unzip[0x41172f] unzip[0x403c61] /lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xf1)[0x7efc0398a2b1] unzip[0x401e39] ======= Memory map: ======== 00400000-00426000 r-xp 00000000 fd:00 276486 /usr/bin/unzip 00625000-00626000 r--p 00025000 fd:00 276486 /usr/bin/unzip 00626000-00627000 rw-p 00026000 fd:00 276486 /usr/bin/unzip 00627000-00719000 rw-p 00000000 00:00 0 02362000-02383000 rw-p 00000000 00:00 0 [heap] 7efc03753000-7efc03769000 r-xp 00000000 fd:00 524295 /lib/x86_64-linux-gnu/libgcc_s.so.1 7efc03769000-7efc03968000 ---p 00016000 fd:00 524295 /lib/x86_64-linux-gnu/libgcc_s.so.1 7efc03968000-7efc03969000 r--p 00015000 fd:00 524295 /lib/x86_64-linux-gnu/libgcc_s.so.1 7efc03969000-7efc0396a000 rw-p 00016000 fd:00 524295 /lib/x86_64-linux-gnu/libgcc_s.so.1 7efc0396a000-7efc03aff000 r-xp 00000000 fd:00 531855 /lib/x86_64-linux-gnu/libc-2.24.so 7efc03aff000-7efc03cfe000 ---p 00195000 fd:00 531855 /lib/x86_64-linux-gnu/libc-2.24.so 7efc03cfe000-7efc03d02000 r--p 00194000 fd:00 531855 /lib/x86_64-linux-gnu/libc-2.24.so 7efc03d02000-7efc03d04000 rw-p 00198000 fd:00 531855 /lib/x86_64-linux-gnu/libc-2.24.so 7efc03d04000-7efc03d08000 rw-p 00000000 00:00 0 7efc03d08000-7efc03d17000 r-xp 00000000 fd:00 524381 /lib/x86_64-linux-gnu/libbz2.so.1.0.4 7efc03d17000-7efc03f16000 ---p 0000f000 fd:00 524381 /lib/x86_64-linux-gnu/libbz2.so.1.0.4 7efc03f16000-7efc03f17000 r--p 0000e000 fd:00 524381 /lib/x86_64-linux-gnu/libbz2.so.1.0.4 7efc03f17000-7efc03f18000 rw-p 0000f000 fd:00 524381 /lib/x86_64-linux-gnu/libbz2.so.1.0.4 7efc03f18000-7efc03f3b000 r-xp 00000000 fd:00 531850 /lib/x86_64-linux-gnu/ld-2.24.so 7efc03f8d000-7efc04128000 r--p 00000000 fd:00 264231 /usr/lib/locale/locale-archive 7efc04128000-7efc0412a000 rw-p 00000000 00:00 0 7efc04136000-7efc0413a000 rw-p 00000000 00:00 0 7efc0413a000-7efc0413b000 r--p 00022000 fd:00 531850 /lib/x86_64-linux-gnu/ld-2.24.so 7efc0413b000-7efc0413c000 rw-p 00023000 fd:00 531850 /lib/x86_64-linux-gnu/ld-2.24.so 7efc0413c000-7efc0413d000 rw-p 00000000 00:00 0 7ffc84a93000-7ffc84ab4000 rw-p 00000000 00:00 0 [stack] 7ffc84ba5000-7ffc84ba7000 r--p 00000000 00:00 0 [vvar] 7ffc84ba7000-7ffc84ba9000 r-xp 00000000 00:00 0 [vdso] If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2014-9913 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9913 [1] https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750 Please adjust the affected versions in the BTS as needed. Regards, Salvatore