{"affected":[{"ecosystem_specific":{"binaries":[{"unzip":"6.00-4.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15","name":"unzip","purl":"pkg:rpm/suse/unzip&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.00-4.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for unzip fixes the following issues:\n\n- CVE-2014-9636: Prevent denial of service (out-of-bounds read or write and\n  crash) via an extra field with an uncompressed size smaller than the compressed\n  field size in a zip archive that advertises STORED method compression\n  (bsc#914442)\n- CVE-2018-1000035: Prevent heap-based buffer overflow in the processing of\n  password-protected archives that allowed an attacker to perform a denial of\n  service or to possibly achieve code execution (bsc#1080074)\n\nThis non-security issue was fixed:\n\n+- Allow processing of Windows zip64 archives (Windows archivers set\n  total_disks field to 0 but per standard, valid values are 1 and higher)\n  (bnc#910683)\n","id":"SUSE-SU-2018:1883-1","modified":"2018-07-05T06:38:08Z","published":"2018-07-05T06:38:08Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20181883-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1080074"},{"type":"REPORT","url":"https://bugzilla.suse.com/910683"},{"type":"REPORT","url":"https://bugzilla.suse.com/914442"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-9636"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-1000035"}],"related":["CVE-2014-9636","CVE-2018-1000035"],"summary":"Security update for unzip","upstream":["CVE-2014-9636","CVE-2018-1000035"]}