libzip-1.3.0 fixing this and another CVE is now available.
 Thomas

On Fri, Sep 01, 2017 at 11:14:02PM +0200, Salvatore Bonaccorso wrote:
> Source: libzip
> Version: 0.11.2-1.2
> Severity: important
> Tags: security upstream patch fixed-upstream
> 
> Hi,
> 
> the following vulnerability was published for libzip.
> 
> CVE-2017-14107[0]:
> | The _zip_read_eocd64 function in zip_open.c in libzip before 1.3.0
> | mishandles EOCD records, which allows remote attackers to cause a
> | denial of service (memory allocation failure in _zip_cdir_grow in
> | zip_dirent.c) via a crafted ZIP archive.
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2017-14107
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14107
> [1] 
> https://blogs.gentoo.org/ago/2017/09/01/libzip-memory-allocation-failure-in-_zip_cdir_grow-zip_dirent-c/
> [2] 
> https://github.com/nih-at/libzip/commit/9b46957ec98d85a572e9ef98301247f39338a3b5
> 
> Regards,
> Salvatore
> 

Reply via email to