DescriptionA use-after-free in the _zip_dirent_read function of zip_dirent.c in libzip 1.2.0 allows attackers to have an unspecified impact by attempting to unzip a malformed ZIP archive. NOTE: the discoverer states "This use-after-free is triggered prior to the double free reported in CVE-2017-12858."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libzip (PTS)buster1.5.1-4fixed
trixie, sid, bookworm, bullseye1.7.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libzipsource(unstable)(not affected)


- libzip <not-affected> (Vulnerable code introduced later; and never in a released version in Debian)
Introduced after: (rel-1-2-0)
Fixed by: (rel-1-3-0)
Same fixing commit as CVE-2017-12858 apparently, but CVE assignment for
two different use-after-free issues.

Search for package or bug name: Reporting problems