Bug 1542333 (CVE-2018-1056)
Summary: | CVE-2018-1056 advancecomp: Heap buffer overflow in zip.cc:zip_entry::load_cent() allows for denial of service or unspecified impact via crafted ZIP file | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sam Fowler <sfowler> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | apevec, bcourt, bkearney, carnil, chrisw, i, jjoyce, jmatthew, jschluet, lhh, lpeer, markmc, mburns, mmccune, ohadlevy, rbryant, rchan, sclewis, slinaber, srevivo, tdecacqu, than, tsanders |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | advancecomp 2.1-2018/02 | Doc Type: | If docs needed, set a value |
Doc Text: |
An out-of-bounds heap buffer read flaw was found in the way advancecomp handled processing of ZIP files. An attacker could potentially use this flaw to crash the advzip utility by tricking it into processing crafted ZIP files.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-21 19:54:15 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1542334, 1543104, 1543105, 1548327 | ||
Bug Blocks: | 1542335 |
Description
Sam Fowler
2018-02-06 06:08:38 UTC
Created advancecomp tracking bugs for this issue: Affects: fedora-all [bug 1542334] Red Hat OpenStack 6 will be unsupported from the 17th February 2018. This package is shipped to support the installation of Red Hat OpenStack Platform 6 and should not be used. This vulnerability will not be fixed in Red Hat OpenStack Platform 6. Statement: This issue affects the versions of advancecomp as shipped with Red Hat Satellite 6. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. The issue has been forwarded upstream to https://sourceforge.net/p/advancemame/bugs/259/ |