Debian Package Tracker
Register | Log in
Subscribe

unzip

De-archiver for .zip files

Choose email to subscribe with

general
  • source: unzip (main)
  • version: 6.0-26
  • maintainer: Santiago Vila (DMD)
  • arch: any
  • std-ver: 4.5.1
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 6.0-21+deb9u2
  • oldstable: 6.0-23+deb10u2
  • stable: 6.0-26
  • testing: 6.0-26
  • unstable: 6.0-26
versioned links
  • 6.0-21+deb9u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.0-23+deb10u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.0-26: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • unzip (18 bugs: 1, 8, 9, 0)
action needed
2 security issues in stretch high

There are 2 open security issues in stretch.

2 important issues:
  • CVE-2022-0529: A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
  • CVE-2022-0530: A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
Created: 2022-02-09 Last update: 2022-04-29 12:30
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2022-0529: A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
  • CVE-2022-0530: A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
Created: 2022-02-09 Last update: 2022-04-29 12:30
2 security issues in buster high

There are 2 open security issues in buster.

2 important issues:
  • CVE-2022-0529: A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
  • CVE-2022-0530: A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
Created: 2022-02-09 Last update: 2022-04-29 12:30
2 security issues in bullseye high

There are 2 open security issues in bullseye.

2 important issues:
  • CVE-2022-0529: A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
  • CVE-2022-0530: A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
Created: 2022-02-09 Last update: 2022-04-29 12:30
2 security issues in bookworm high

There are 2 open security issues in bookworm.

2 important issues:
  • CVE-2022-0529: A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
  • CVE-2022-0530: A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
Created: 2022-02-09 Last update: 2022-04-29 12:30
lintian reports 2 errors and 5 warnings high
Lintian reports 2 errors and 5 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2021-01-27 Last update: 2021-09-06 18:35
7 bugs tagged patch in the BTS normal
The BTS contains patches fixing 7 bugs, consider including or untagging them.
Created: 2021-08-14 Last update: 2022-05-28 13:33
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2014-07-02 Last update: 2021-01-12 00:05
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.1).
Created: 2021-08-18 Last update: 2022-05-11 23:24
news
[rss feed]
  • [2021-01-23] Accepted unzip 6.0-23+deb10u2 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Santiago Vila)
  • [2021-01-16] unzip 6.0-26 MIGRATED to testing (Debian testing watch)
  • [2021-01-10] Accepted unzip 6.0-26 (source) into unstable (Santiago Vila)
  • [2020-01-28] Accepted unzip 6.0-16+deb8u6 (source amd64) into oldoldstable (Thorsten Alteholz)
  • [2019-08-16] Accepted unzip 6.0-21+deb9u2 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Santiago Vila)
  • [2019-08-12] Accepted unzip 6.0-23+deb10u1 (source) into proposed-updates->stable-new, proposed-updates (Santiago Vila)
  • [2019-08-02] unzip 6.0-25 MIGRATED to testing (Debian testing watch)
  • [2019-07-28] Accepted unzip 6.0-16+deb8u5 (source amd64) into oldoldstable (Markus Koschany)
  • [2019-07-27] Accepted unzip 6.0-25 (source) into unstable (Santiago Vila)
  • [2019-07-17] unzip 6.0-24 MIGRATED to testing (Debian testing watch)
  • [2019-07-11] Accepted unzip 6.0-24 (source) into unstable (Santiago Vila)
  • [2019-07-07] Accepted unzip 6.0-16+deb8u4 (source amd64) into oldoldstable (Markus Koschany)
  • [2019-06-03] unzip 6.0-23 MIGRATED to testing (Debian testing watch)
  • [2019-05-28] Accepted unzip 6.0-23 (source) into unstable (Santiago Vila)
  • [2019-04-18] Accepted unzip 6.0-21+deb9u1 (source) into proposed-updates->stable-new, proposed-updates (Santiago Vila)
  • [2019-02-20] unzip 6.0-22 MIGRATED to testing (Debian testing watch)
  • [2019-02-09] Accepted unzip 6.0-22 (source) into unstable (Santiago Vila)
  • [2017-01-29] Accepted unzip 6.0-16+deb8u3 (source amd64) into proposed-updates->stable-new, proposed-updates (Santiago Vila)
  • [2016-12-22] unzip 6.0-21 MIGRATED to testing (Debian testing watch)
  • [2016-12-13] Accepted unzip 6.0-8+deb7u6 (source amd64) into oldstable (Raphaël Hertzog)
  • [2016-12-11] Accepted unzip 6.0-21 (source) into unstable (Santiago Vila)
  • [2015-11-15] Accepted unzip 6.0-8+deb7u5 (source amd64) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Salvatore Bonaccorso)
  • [2015-11-15] Accepted unzip 6.0-16+deb8u2 (source) into proposed-updates->stable-new, proposed-updates (Salvatore Bonaccorso)
  • [2015-11-12] unzip 6.0-20 MIGRATED to testing (Britney)
  • [2015-11-09] Accepted unzip 6.0-20 (source) into unstable (Santiago Vila)
  • [2015-10-31] Accepted unzip 6.0-8+deb7u4 (source amd64) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2015-10-31] Accepted unzip 6.0-16+deb8u1 (source amd64) into proposed-updates->stable-new, proposed-updates (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2015-10-28] unzip 6.0-19 MIGRATED to testing (Britney)
  • [2015-10-22] Accepted unzip 6.0-19 (source) into unstable (Santiago Vila)
  • [2015-10-22] Accepted unzip 6.0-4+deb6u3 (source amd64) into squeeze-lts (Raphaël Hertzog)
  • 1
  • 2
bugs [bug history graph]
  • all: 18
  • RC: 1
  • I&N: 8
  • M&W: 9
  • F&P: 0
  • patch: 7
links
  • homepage
  • lintian (2, 5)
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 6.0-26ubuntu3
  • 23 bugs (3 patches)
  • patches for 6.0-26ubuntu3

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing