Source: apktool
Version: 2.7.0+dfsg-6
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for apktool.

CVE-2024-21633[0]:
| Apktool is a tool for reverse engineering Android APK files. In
| versions 2.9.1 and prior, Apktool infers resource files' output path
| according to their resource names which can be manipulated by
| attacker to place files at desired location on the system Apktool
| runs on. Affected environments are those in which an attacker may
| write/overwrite any file that user has write access, and either user
| name is known or cwd is under user folder. Commit
| d348c43b24a9de350ff6e5bd610545a10c1fc712 contains a patch for this
| issue.

The fix won't apply clearly to the 2.7.0 version in unstable, but the
advisory at least says that the earlier and including verison 2.9.1
are affected, maybe can you double check?

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-21633
    https://www.cve.org/CVERecord?id=CVE-2024-21633
[1] 
https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-2hqv-2xv4-5h5w
[2] 
https://github.com/iBotPeaches/Apktool/commit/d348c43b24a9de350ff6e5bd610545a10c1fc712

Regards,
Salvatore

Reply via email to