Bug 9300

Summary: quazip security vulnerability (CVE-2018-1002209)
Product: [ROSA-based products] ROSA Fresh Reporter: Zombie Ryushu <zombie.ryushu>
Component: Packages from MainAssignee: ROSA Linux Bugs <bugs>
Status: RESOLVED DUPLICATE QA Contact: ROSA Linux Bugs <bugs>
Severity: normal    
Priority: Normal CC: alzim, andrey.bondrov, denis.silakov, mc2374
Version: Plasma5   
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: https://advisories.mageia.org/MGASA-2018-0362.html
Whiteboard:
Platform: --- ROSA Vulnerability identifier: quazip-0.7-7.src.rpm
RPM Package: CVE-2018-1002209 ISO-related:
Bad POT generating: Upstream:
Bug Depends on: 9340    
Bug Blocks:    

Description Zombie Ryushu 2018-09-06 08:14:19 MSK
A vulnerability has been found in the way developers have implemented the
archive extraction of files. An arbitrary file write vulnerability, that
can be achieved using a specially crafted zip archive (affects other
archives as well, bzip2, tar,xz, war, cpio, 7z), that holds path traversal
filenames. So when the filename gets concatenated to the target extraction
directory, the final path ends up outside of the target folder. Of course
if an executable or a configuration file is overwritten with a file
containing malicious code, the problem can turn into an arbitrary code
execution issue quite easily. This affects multiple libraries that lacks of
a high level APIs that provide the archive extraction functionality
(CVE-2018-1002209).
Comment 1 Алзим 2018-09-24 13:58:01 MSK

*** This bug has been marked as a duplicate of bug 9340 ***