{"schema_version":"1.7.2","id":"OESA-2021-1294","modified":"2021-07-31T11:03:06Z","published":"2021-07-31T11:03:06Z","upstream":["CVE-2017-17969","CVE-2018-5996","CVE-2018-10115","CVE-2016-9296"],"summary":"p7zip security update","details":"7za for Linux system to archive file as 7z file format\r\n\r\nSecurity Fix(es):\r\n\r\nHeap-based buffer overflow in the NCompress::NShrink::CDecoder::CodeReal method in 7-Zip before 18.00 and p7zip allows remote attackers to cause a denial of service (out-of-bounds write) or potentially execute arbitrary code via a crafted ZIP archive.(CVE-2017-17969)\r\n\r\nInsufficient exception handling in the method NCompress::NRar3::CDecoder::Code of 7-Zip before 18.00 and p7zip can lead to multiple memory corruptions within the PPMd code, allows remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive.(CVE-2018-5996)\r\n\r\nIncorrect initialization logic of RAR decoder objects in 7-Zip 18.03 and before can lead to usage of uninitialized memory, allowing remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive.(CVE-2018-10115)\r\n\r\nA null pointer dereference bug affects the 16.02 and many old versions of p7zip. A lack of null pointer check for the variable folders.PackPositions in function CInArchive::ReadAndDecodePackedStreams in CPP/7zip/Archive/7z/7zIn.cpp, as used in the 7z.so library and in 7z applications, will cause a crash and a denial of service when decoding malformed 7z files.(CVE-2016-9296)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP2","name":"p7zip","purl":"pkg:rpm/openEuler/p7zip\u0026distro=openEuler-20.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"16.02-3.oe1"}]}],"ecosystem_specific":{"aarch64":["p7zip-16.02-3.oe1.aarch64.rpm"],"src":["p7zip-16.02-3.oe1.src.rpm"],"x86_64":["p7zip-16.02-3.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1294"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17969"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5996"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10115"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9296"}],"database_specific":{"severity":"High"}}