{"id":"ALPINE-CVE-2022-0530","details":"A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.","modified":"2026-03-09T01:23:00.770367Z","published":"2022-02-09T23:15:16.677Z","upstream":["CVE-2022-0530"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2022-0530"}],"affected":[{"package":{"name":"unzip","ecosystem":"Alpine:v3.17","purl":"pkg:apk/alpine/unzip?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.0-r11"}]}],"versions":["6.0-r0","6.0-r1","6.0-r10","6.0-r2","6.0-r3","6.0-r4","6.0-r5","6.0-r6","6.0-r7","6.0-r8","6.0-r9"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2022-0530.json"}},{"package":{"name":"unzip","ecosystem":"Alpine:v3.18","purl":"pkg:apk/alpine/unzip?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.0-r11"}]}],"versions":["6.0-r0","6.0-r1","6.0-r10","6.0-r2","6.0-r3","6.0-r4","6.0-r5","6.0-r6","6.0-r7","6.0-r8","6.0-r9"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2022-0530.json"}},{"package":{"name":"unzip","ecosystem":"Alpine:v3.19","purl":"pkg:apk/alpine/unzip?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.0-r11"}]}],"versions":["6.0-r0","6.0-r1","6.0-r10","6.0-r2","6.0-r3","6.0-r4","6.0-r5","6.0-r6","6.0-r7","6.0-r8","6.0-r9"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2022-0530.json"}},{"package":{"name":"unzip","ecosystem":"Alpine:v3.20","purl":"pkg:apk/alpine/unzip?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.0-r11"}]}],"versions":["6.0-r0","6.0-r1","6.0-r10","6.0-r2","6.0-r3","6.0-r4","6.0-r5","6.0-r6","6.0-r7","6.0-r8","6.0-r9"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2022-0530.json"}},{"package":{"name":"unzip","ecosystem":"Alpine:v3.21","purl":"pkg:apk/alpine/unzip?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.0-r11"}]}],"versions":["6.0-r0","6.0-r1","6.0-r10","6.0-r2","6.0-r3","6.0-r4","6.0-r5","6.0-r6","6.0-r7","6.0-r8","6.0-r9"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2022-0530.json"}},{"package":{"name":"unzip","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/unzip?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.0-r11"}]}],"versions":["6.0-r0","6.0-r1","6.0-r10","6.0-r2","6.0-r3","6.0-r4","6.0-r5","6.0-r6","6.0-r7","6.0-r8","6.0-r9"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2022-0530.json"}},{"package":{"name":"unzip","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/unzip?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.0-r11"}]}],"versions":["6.0-r0","6.0-r1","6.0-r10","6.0-r2","6.0-r3","6.0-r4","6.0-r5","6.0-r6","6.0-r7","6.0-r8","6.0-r9"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2022-0530.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}