MGASA-2018-0020

Source
https://advisories.mageia.org/MGASA-2018-0020.html
Import Source
https://advisories.mageia.org/MGASA-2018-0020.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2018-0020
Related
Published
2018-01-02T15:02:16Z
Modified
2018-01-02T14:28:39Z
Summary
Updated libzip packages fix security vulnerability
Details

The zipreadeocd64 function mishandled EOCD records, which allowed remote attackers to cause a denial of service (memory allocation failure in _zipcdirgrow in zipdirent.c) via a crafted ZIP archive (CVE-2017-14107).

References
Credits

Affected packages

Mageia:5 / libzip

Package

Name
libzip
Purl
pkg:rpm/mageia/libzip?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.11.2-4.1.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:6 / libzip

Package

Name
libzip
Purl
pkg:rpm/mageia/libzip?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.3-1.1.mga6

Ecosystem specific

{
    "section": "core"
}