MGASA-2017-0132

Source
https://advisories.mageia.org/MGASA-2017-0132.html
Import Source
https://advisories.mageia.org/MGASA-2017-0132.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2017-0132
Related
Published
2017-05-07T20:20:23Z
Modified
2017-05-07T20:07:38Z
Summary
Updated libarchive packages fix security vulnerabilities
Details

The archivewstringappendfrommbs function in archive_string.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive file. (CVE-2016-10209)

The archivele32dec function in archiveendian.h in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. (CVE-2016-10349)

The archivereadformatcabreadheader function in archivereadsupportformat_cab.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. (CVE-2016-10350)

References
Credits

Affected packages

Mageia:5 / libarchive

Package

Name
libarchive
Purl
pkg:rpm/mageia/libarchive?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.2-1.3.mga5

Ecosystem specific

{
    "section": "core"
}