Revision Date: | 2018-10-02 | Version: | 1 |
Title: | Security update for unzip (Moderate) |
Description: |
This update for unzip fixes the following security issues:
- CVE-2014-9913: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013993) - CVE-2015-7696: Specially crafted zip files with password protection could trigger a crash and lead to denial of service (bsc#950110) - CVE-2015-7697: Specially crafted zip files could trigger an endless loop and lead to denial of service (bsc#950111) - CVE-2016-9844: Specially crafted zip files could trigger invalid memory writes possibly resulting in DoS or corruption (bsc#1013992) - CVE-2018-1000035: Prevent heap-based buffer overflow in the processing of password-protected archives that allowed an attacker to perform a denial of service or to possibly achieve code execution (bsc#1080074). - CVE-2014-9636: Prevent denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression (bsc#914442).
This non-security issue was fixed:
+- Allow processing of Windows zip64 archives (Windows archivers set total_disks field to 0 but per standard, valid values are 1 and higher) (bnc#910683)
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1013992 1013993 1080074 910683 914442 950110 950111 CVE-2014-9636 CVE-2014-9913 CVE-2015-7696 CVE-2015-7697 CVE-2016-9844 CVE-2018-1000035
|
Platform(s): | SUSE Linux Enterprise Server 12 SP3-TERADATA
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Server 12 SP3-TERADATA is installed AND unzip-6.00-33.8.1 is installed
|