Note:
This project will be discontinued after December 13, 2021. [more]
2017-09-06
libarchive 3.3.2 allows remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c.
Products | Ubuntu_linux, Debian_linux, Libarchive |
Type | Out-of-bounds Read (CWE-125) |
First patch |
https://github.com/libarchive/libarchive/commit/fa7438a0ff4033e4741c807394a9af6207940d71 |
Relevant file/s | ./libarchive/archive_read_support_format_xar.c (modified, +7, -1) |
Links |
• https://blogs.gentoo.org/ago/2017/09/06/libarchive-heap-based-buffer-overflow-in-xml_data-archive_read_support_format_xar-c/
• https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html • https://usn.ubuntu.com/3736-1/ • https://security.gentoo.org/glsa/201908-11 • https://www.debian.org/security/2018/dsa-4360 |
Navigation
Patch data:
Patched area:
(on by default)
Patched area: