MGASA-2017-0163

Source
https://advisories.mageia.org/MGASA-2017-0163.html
Import Source
https://advisories.mageia.org/MGASA-2017-0163.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2017-0163
Related
Published
2017-06-09T23:05:58Z
Modified
2017-06-09T22:51:19Z
Summary
Updated zziplib packages fix security vulnerability
Details

Heap-based buffer overflow in _zzipget32 in fetch.c (CVE-2017-5974).

Heap-based buffer overflow in _zzipget64 in fetch.c (CVE-2017-5975).

Heap-based buffer overflow in zzipmementryextrablock in memdisk.c (CVE-2017-5976).

Invalid memory read in zzipmementryextrablock in memdisk.c (CVE-2017-5977).

Out of bounds read in zzipmementry_new in memdisk.c (CVE-2017-5978).

NULL pointer dereference in prescan_entry in fseeko.c (CVE-2017-5979).

NULL pointer dereference in zzipmementry_new in memdisk.c (CVE-2017-5980).

Assertion failure in seeko.c (CVE-2017-5981).

NULL pointer dereference in main in unzzipcat-mem.c (bsc#1024532).

NULL pointer dereference in main in unzzipcat.c (bsc#1024537).

References
Credits

Affected packages