{"id":"MGASA-2014-0562","summary":"Updated unzip package fixes security vulnerabilities","details":"Updated unzip package fix security vulnerabilities:\n\nThe unzip command line tool is affected by heap-based buffer overflows within\nthe CRC32 verification (CVE-2014-8139), the test_compr_eb() (CVE-2014-8140)\nand the getZip64Data() (CVE-2014-8141) functions. The input errors may result\nin arbitrary code execution. A specially crafted zip file, passed to the\ncommand unzip -t, can be used to trigger the vulnerability.\n\nOOB access (both read and write) issues also exist in test_compr_eb()\nthat can result in application crash or other unspecified impact. A\nspecially crafted zip file, passed to the command unzip -t, can be used to\ntrigger the issues.\n","modified":"2026-04-16T00:09:43.623912893Z","published":"2014-12-31T12:28:04Z","upstream":["CVE-2014-8139","CVE-2014-8140","CVE-2014-8141"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0562.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=14872"},{"type":"ADVISORY","url":"http://www.ocert.org/advisories/ocert-2014-011.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1174844"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1174851"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1174856"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2014/12/22/12"}],"affected":[{"package":{"name":"unzip","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/unzip?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.0-7.2.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0562.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}