DSA-3113-1 unzip -- security update

Related Vulnerabilities: CVE-2014-8139   CVE-2014-8140   CVE-2014-8141  

Michele Spagnuolo of the Google Security Team discovered that unzip, an extraction utility for archives compressed in .zip format, is affected by heap-based buffer overflows within the CRC32 verification function (CVE-2014-8139), the test_compr_eb() function (CVE-2014-8140) and the getZip64Data() function (CVE-2014-8141), which may lead to the execution of arbitrary code. For the stable distribution (wheezy), these problems have been fixed in version 6.0-8+deb7u1. For the upcoming stable distribution (jessie), these problems will be fixed soon. For the unstable distribution (sid), these problems have been fixed in version 6.0-13. We recommend that you upgrade your unzip packages.

Debian Security Advisory

DSA-3113-1 unzip -- security update

Date Reported:
28 Dec 2014
Affected Packages:
unzip
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 773722.
In Mitre's CVE dictionary: CVE-2014-8139, CVE-2014-8140, CVE-2014-8141.
More information:

Michele Spagnuolo of the Google Security Team discovered that unzip, an extraction utility for archives compressed in .zip format, is affected by heap-based buffer overflows within the CRC32 verification function (CVE-2014-8139), the test_compr_eb() function (CVE-2014-8140) and the getZip64Data() function (CVE-2014-8141), which may lead to the execution of arbitrary code.

For the stable distribution (wheezy), these problems have been fixed in version 6.0-8+deb7u1.

For the upcoming stable distribution (jessie), these problems will be fixed soon.

For the unstable distribution (sid), these problems have been fixed in version 6.0-13.

We recommend that you upgrade your unzip packages.