Buildroot Archive on lore.kernel.org
 help / color / mirror / Atom feed
From: Peter Korsgaard <peter@korsgaard.com>
To: buildroot@busybox.net
Subject: [Buildroot] [PATCH] package/libarchive: add four security patches
Date: Sun, 27 Jan 2019 21:27:04 +0100	[thread overview]
Message-ID: <87r2cxonhj.fsf@dell.be.48ers.dk> (raw)
In-Reply-To: <20190125185053.4882-1-patrickdepinguin@gmail.com> (Thomas De Schampheleire's message of "Fri, 25 Jan 2019 19:50:52 +0100")

>>>>> "Thomas" == Thomas De Schampheleire <patrickdepinguin@gmail.com> writes:

 > From: Thomas De Schampheleire <thomas.de_schampheleire@nokia.com>
 > Add backported patches for the following four security issues in libarchive.
 > There is no new release yet including these patches.

 > - CVE-2018-1000877 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000877)

 > "libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards
 > (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in
 > RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(),
 > realloc(rar->lzss.window, new_size) with new_size = 0 that can result in
 > Crash/DoS. This attack appear to be exploitable via the victim must open a
 > specially crafted RAR archive."

 > - CVE-2018-1000878 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000878)

 > "libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards
 > (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in
 > RAR decoder - libarchive/archive_read_support_format_rar.c that can result
 > in Crash/DoS - it is unknown if RCE is possible. This attack appear to be
 > exploitable via the victim must open a specially crafted RAR archive."

 > - CVE-2018-1000879 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000879)

 > "libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards
 > (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference
 > vulnerability in ACL parser - libarchive/archive_acl.c,
 > archive_acl_from_text_l() that can result in Crash/DoS. This attack appear
 > to be exploitable via the victim must open a specially crafted archive
 > file."

 > - CVE-2018-1000880 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000880)

 > "libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards
 > (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation
 > vulnerability in WARC parser -
 > libarchive/archive_read_support_format_warc.c, _warc_read() that can result
 > in DoS - quasi-infinite run time and disk usage from tiny file. This attack
 > appear to be exploitable via the victim must open a specially crafted WARC
 > file."

 > Signed-off-by: Thomas De Schampheleire <thomas.de_schampheleire@nokia.com>

Committed, thanks.

-- 
Bye, Peter Korsgaard

  reply	other threads:[~2019-01-27 20:27 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-01-25 18:50 [Buildroot] [PATCH] package/libarchive: add four security patches Thomas De Schampheleire
2019-01-27 20:27 ` Peter Korsgaard [this message]
2019-01-29 21:54 ` Peter Korsgaard

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87r2cxonhj.fsf@dell.be.48ers.dk \
    --to=peter@korsgaard.com \
    --cc=buildroot@busybox.net \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox