Summary: | <app-arch/unzip-6.0_p20: buffer overflow | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | base-system |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2014/11/02/2 | ||
Whiteboard: | A2 [glsa cleanup] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 533748, 537424, 560416 |
Description
Agostino Sarubbo
2014-11-03 08:09:59 UTC
http://www.ocert.org/advisories/ocert-2014-011.html lists three more security issues: CVE-2014-8139 (CRC32 heap overflow), CVE-2014-8140 (test_compr_eb), CVE-2014-8141 (getZip64Data) All are independent of the american fuzzy lop issue. Unfortunately upstream seems to do releases rarely. There are also some issues mentioned in upstream's forum that are a couple of years old and look like they could be security issues: http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=282&sid=48632af076f5c015cae31c1f37e278c3 those 4 issues should all be fixed in 6.0_p20 by using patches Debian is carrying https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f65df71cdc392f85fd95ad5b8ef1508434e2a239 @arches, please stabilize: =app-arch/unzip-6.0_p20 Stable for HPPA PPC64. amd64 stable x86 stable arm stable alpha stable ppc stable sparc stable ia64 stable Removing unstable arches from CC @maintainer(s), please cleanup vulnerable versions. New GLSA request filed. This issue was resolved and addressed in GLSA 201611-01 at https://security.gentoo.org/glsa/201611-01 by GLSA coordinator Aaron Bauman (b-man). |