mat2 (aka metadata anonymisation toolkit) before 0.13.0 allows ../ directory traversal during the ZIP archive cleaning process. This primarily affects mat2 web instances, in which clients could obtain sensitive information via a crafted archive.
{ "binaries": [ { "binary_name": "mat", "binary_version": "0.10.1-1" }, { "binary_name": "mat2", "binary_version": "0.10.1-1" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-35410.json"
{ "binaries": [ { "binary_name": "mat", "binary_version": "0.12.2-1.1" }, { "binary_name": "mat2", "binary_version": "0.12.2-1.1" } ] }
{ "binaries": [ { "binary_name": "mat2", "binary_version": "0.13.4-2.1" } ] }
{ "binaries": [ { "binary_name": "mat2", "binary_version": "0.13.5-1.2" } ] }
{ "binaries": [ { "binary_name": "mat2", "binary_version": "0.14.0-1ubuntu1" } ] }