Name | CVE-2023-40477 |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3542-1, DLA-3543-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
rar (PTS) | buster/non-free, bullseye/non-free | 2:5.5.0-1 | vulnerable |
| buster/non-free (security) | 2:6.23-1~deb10u1 | fixed |
| bookworm/non-free | 2:6.20-0.1 | vulnerable |
| trixie/non-free, sid/non-free | 2:6.23-1 | fixed |
unrar-nonfree (PTS) | buster/non-free | 1:5.6.6-1+deb10u1 | vulnerable |
| buster/non-free (security) | 1:5.6.6-1+deb10u4 | fixed |
| bullseye/non-free | 1:6.0.3-1+deb11u1 | vulnerable |
| bookworm/non-free | 1:6.2.6-1 | vulnerable |
| trixie/non-free, sid/non-free | 1:6.2.11-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bookworm] - rar <no-dsa> (Non-free not supported)
[bullseye] - rar <no-dsa> (Non-free not supported)
[bookworm] - unrar-nonfree <no-dsa> (Non-free not supported)
[bullseye] - unrar-nonfree <no-dsa> (Non-free not supported)
https://www.zerodayinitiative.com/advisories/ZDI-23-1152/
https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=232&cHash=c5bf79590657e32554c6683296a8e8aa