A correction fix is requested for : CVE-2014-8139 unzip: CRC32 verification heap-based buffer overread (oCERT-2014-011) The problem was an unrealistic/invalid value in a .ZIP Extra Field. There was a check (in extract.c:TestExtraField()) for an extra-block length that was too large, but no check for a too-small value. In this example, the length (ebLen) was 1, and when "(ebLen-4)" was passed to crc32(), bad things happened. which according to: http://www.ocert.org/advisories/ocert-2014-011.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139
none