CVE-2018-18384

NameCVE-2018-18384
DescriptionInfo-ZIP UnZip 6.0 has a buffer overflow in list.c, when a ZIP archive has a crafted relationship between the compressed-size value and the uncompressed-size value, because a buffer size is 10 and is supposed to be 12.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs741384

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
unzip (PTS)jessie, jessie (lts)6.0-16+deb8u7fixed
stretch (lts), stretch6.0-21+deb9u3fixed
buster (security), buster, buster (lts)6.0-23+deb10u3fixed
bullseye (security), bullseye6.0-26+deb11u1fixed
sid, trixie, bookworm6.0-28fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
unzipsourcewheezy6.0-8+deb7u3
unzipsource(unstable)6.0-11741384

Notes

https://bugzilla.suse.com/show_bug.cgi?id=1110194
https://sourceforge.net/p/infozip/bugs/53/
The cfactorstr buffer was already increased to 12 with the
07-increase-size-of-cfactorstr.patch patch as applied for #741384
Upstream confirmed as well this is indeed enough as per
https://sourceforge.net/p/infozip/bugs/53/#ba07

Search for package or bug name: Reporting problems