Security update for unzip utility with buffer overflow vulnerabilities
Reporter | Title | Published | Views | Family All 177 |
---|---|---|---|---|
![]() | Fedora 20 : unzip-6.0-17.fc20 (2015-1993) | 24 Feb 201500:00 | – | nessus |
![]() | Mandriva Linux Security Advisory : unzip (MDVSA-2015:016) | 9 Jan 201500:00 | – | nessus |
![]() | GLSA-201611-01 : UnZip: Multiple vulnerabilities | 2 Nov 201600:00 | – | nessus |
![]() | Fedora 21 : unzip-6.0-20.fc21 (2015-2035) | 16 Feb 201500:00 | – | nessus |
![]() | RHEL 6 / 7 : unzip (RHSA-2015:0700) | 19 Mar 201500:00 | – | nessus |
![]() | Oracle Linux 6 / 7 : unzip (ELSA-2015-0700) | 19 Mar 201500:00 | – | nessus |
![]() | CentOS 6 / 7 : unzip (CESA-2015:0700) | 19 Mar 201500:00 | – | nessus |
![]() | OracleVM 3.3 : unzip (OVMSA-2015-0037) | 20 Mar 201500:00 | – | nessus |
![]() | Scientific Linux Security Update : unzip on SL6.x, SL7.x i386/x86_64 (20150318) | 26 Mar 201500:00 | – | nessus |
![]() | Amazon Linux AMI : unzip (ALAS-2015-504) | 17 Apr 201500:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 6 | i686 | unzip-debuginfo | 6.0-2.el6_6 | unzip-debuginfo-6.0-2.el6_6.i686.rpm |
RedHat | 6 | s390x | unzip-debuginfo | 6.0-2.el6_6 | unzip-debuginfo-6.0-2.el6_6.s390x.rpm |
RedHat | 6 | s390x | unzip | 6.0-2.el6_6 | unzip-6.0-2.el6_6.s390x.rpm |
RedHat | 6 | ppc64 | unzip-debuginfo | 6.0-2.el6_6 | unzip-debuginfo-6.0-2.el6_6.ppc64.rpm |
RedHat | 7 | ppc64 | unzip-debuginfo | 6.0-15.el7 | unzip-debuginfo-6.0-15.el7.ppc64.rpm |
RedHat | 6 | i686 | unzip | 6.0-2.el6_6 | unzip-6.0-2.el6_6.i686.rpm |
RedHat | 7 | s390x | unzip | 6.0-15.el7 | unzip-6.0-15.el7.s390x.rpm |
RedHat | 7 | x86_64 | unzip-debuginfo | 6.0-15.el7 | unzip-debuginfo-6.0-15.el7.x86_64.rpm |
RedHat | 7 | s390x | unzip-debuginfo | 6.0-15.el7 | unzip-debuginfo-6.0-15.el7.s390x.rpm |
RedHat | 6 | src | unzip | 6.0-2.el6_6 | unzip-6.0-2.el6_6.src.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo