MGASA-2014-0562

Source
https://advisories.mageia.org/MGASA-2014-0562.html
Import Source
https://advisories.mageia.org/MGASA-2014-0562.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0562
Related
Published
2014-12-31T12:28:04Z
Modified
2014-12-31T12:20:11Z
Summary
Updated unzip package fixes security vulnerabilities
Details

Updated unzip package fix security vulnerabilities:

The unzip command line tool is affected by heap-based buffer overflows within the CRC32 verification (CVE-2014-8139), the testcompreb() (CVE-2014-8140) and the getZip64Data() (CVE-2014-8141) functions. The input errors may result in in arbitrary code execution. A specially crafted zip file, passed to the command unzip -t, can be used to trigger the vulnerability.

OOB access (both read and write) issues also exist in testcompreb() that can result in application crash or other unspecified impact. A specially crafted zip file, passed to the command unzip -t, can be used to trigger the issues.

References
Credits

Affected packages

Mageia:4 / unzip

Package

Name
unzip
Purl
pkg:rpm/mageia/unzip?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0-7.2.mga4

Ecosystem specific

{
    "section": "core"
}