The zipreadeocd64 function in zipopen.c in libzip before 1.3.0 mishandles EOCD records, which allows remote attackers to cause a denial of service (memory allocation failure in zipcdirgrow in zipdirent.c) via a crafted ZIP archive.
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "libzip-dev",
"binary_version": "1.0.1-0ubuntu1.1~esm1"
},
{
"binary_name": "libzip4",
"binary_version": "1.0.1-0ubuntu1.1~esm1"
},
{
"binary_name": "zipcmp",
"binary_version": "1.0.1-0ubuntu1.1~esm1"
},
{
"binary_name": "zipmerge",
"binary_version": "1.0.1-0ubuntu1.1~esm1"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "libzip-dev",
"binary_version": "1.1.2-1.1ubuntu0.1~esm1"
},
{
"binary_name": "libzip4",
"binary_version": "1.1.2-1.1ubuntu0.1~esm1"
},
{
"binary_name": "zipcmp",
"binary_version": "1.1.2-1.1ubuntu0.1~esm1"
},
{
"binary_name": "zipmerge",
"binary_version": "1.1.2-1.1ubuntu0.1~esm1"
},
{
"binary_name": "ziptool",
"binary_version": "1.1.2-1.1ubuntu0.1~esm1"
}
]
}