MGASA-2016-0318

Source
https://advisories.mageia.org/MGASA-2016-0318.html
Import Source
https://advisories.mageia.org/MGASA-2016-0318.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0318
Related
Published
2016-09-25T11:41:52Z
Modified
2016-09-25T17:01:46Z
Summary
Updated libarchive packages fix security vulnerability
Details

The updated packages fix several security vulnerabilities:

A flaw was found in the way libarchive handled hardlink archive entries of non-zero size. Combined with flaws in libarchive's file system sandboxing, this issue could cause an application using libarchive to overwrite arbitrary files with arbitrary data from the archive. (CVE-2016-5418, issues #745 and #746)

Very long pathnames evade symlink checks (issue#744)

sizet underflow leading to out of bounds heap read in processextra() / archivereadsupportformatzip.c (issue#770)

stack-based buffer overflow in bsdtarexpandchar (util.c) (issue#767)

libarchive can compress, but cannot decompress zip some files (issue#748)

hang in tar parser (issue#731)

Out of bounds read in mtree parser (issue#747)

heap-based buffer overflow in readHeader (archivereadsupportformat_7zip.c) (issue#761)

References
Credits

Affected packages