File _patchinfo of Package patchinfo.7892
<patchinfo incident="7892">
<issue tracker="bnc" id="910683">unzip fails to extract file generated by WS2012R2</issue>
<issue tracker="bnc" id="914442">VUL-1: CVE-2014-9636: unzip: out-of-bounds read/write in test_compr_eb() in extract.c</issue>
<issue tracker="bnc" id="1080074">VUL-1: CVE-2018-1000035: unzip: [Heap-based buffer overflow in password protected ZIP archives]</issue>
<issue tracker="cve" id="2014-9636"/>
<issue tracker="cve" id="2018-1000035"/>
<category>security</category>
<rating>moderate</rating>
<packager>kstreitova</packager>
<description>This update for unzip fixes the following issues:
- CVE-2014-9636: Prevent denial of service (out-of-bounds read or write and
crash) via an extra field with an uncompressed size smaller than the compressed
field size in a zip archive that advertises STORED method compression
(bsc#914442)
- CVE-2018-1000035: Prevent heap-based buffer overflow in the processing of
password-protected archives that allowed an attacker to perform a denial of
service or to possibly achieve code execution (bsc#1080074)
This non-security issue was fixed:
+- Allow processing of Windows zip64 archives (Windows archivers set
total_disks field to 0 but per standard, valid values are 1 and higher)
(bnc#910683)
</description>
<summary>Security update for unzip</summary>
</patchinfo>