A flaw was found in ZZIPlib 0.13.69. A directory traversal vulnerability allows attackers to overwrite arbitrary files via a .. (dot dot) in a zip file, because of the function unzzip_cat in the bins/unzzipcat-mem.c file. References: https://github.com/gdraheim/zziplib/issues/62
Created zziplib tracking bugs for this issue: Affects: fedora-all [bug 1635889]
Upstream patch: https://github.com/gdraheim/zziplib/commit/f609ae8971f3c0ce64d38276b778001d0bbfc84b
The same flaw is present in unzzipcat-big.c, unzzipcat-mix.c and unzzipcat-zip.c.
The same problem is also present in unzip-mem.c. Proposed patch for unzip-mem.c: https://github.com/gdraheim/zziplib/files/2482517/patch.txt
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1178 https://access.redhat.com/errata/RHSA-2020:1178
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-17828
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:1653 https://access.redhat.com/errata/RHSA-2020:1653