Mageia 2022-0371: unzip security update
Summary
Improper handling of Unicode strings, which can lead to a null pointer
dereference. This flaw allows an attacker to input a specially crafted zip
file, leading to a crash or code execution. (CVE-2021-4217)
Conversion of a wide string to a local string that leads to a heap of
out-of-bound write. This flaw allows an attacker to input a specially
crafted zip file, leading to a crash or code execution. (CVE-2022-0529,
CVE-2022-0530)
References
- https://bugs.mageia.org/show_bug.cgi?id=29893
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1957077
- https://bugzilla.redhat.com/show_bug.cgi?id=2044583
- https://bugzilla.redhat.com/show_bug.cgi?id=2051395
- https://bugzilla.redhat.com/show_bug.cgi?id=2051402
- https://www.debian.org/security/2022/dsa-5202
- https://www.debian.org/lts/security/2022/dla-3118
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VFUXYMOCMRAV3GMQQKYX6T4L2I23XSQU/
- https://ubuntu.com/security/notices/USN-5673-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530
Resolution
MGASA-2022-0371 - Updated unzip packages fix security vulnerability
SRPMS
- 8/core/unzip-6.0-2.1.mga8