First published: Thu Dec 30 2010(Updated: )
A number of flaws have been corrected in upstream libarchive that have not yet been included in a public release of libarchive (latest version is 2.8.4). A buffer overflow at reading bit lengths of huffman code of LZX when reading a broken CAB file (<a href="https://access.redhat.com/security/cve/CVE-2010-4666">CVE-2010-4666</a>) [1]. Buffer overflows in various functions related to reading archives (in archive_read_support_format_iso9660.c) (<a href="https://access.redhat.com/security/cve/CVE-2011-1777">CVE-2011-1777</a>) [2]. Buffer overflow in reading tar archives (<a href="https://access.redhat.com/security/cve/CVE-2011-1778">CVE-2011-1778</a>) [3]. Use-after-free bugs (<a href="https://access.redhat.com/security/cve/CVE-2011-1779">CVE-2011-1779</a>) [4]. [1] <a href="http://code.google.com/p/libarchive/source/detail?r=2842">http://code.google.com/p/libarchive/source/detail?r=2842</a> [2] <a href="http://code.google.com/p/libarchive/source/detail?r=3158">http://code.google.com/p/libarchive/source/detail?r=3158</a> [3] <a href="http://code.google.com/p/libarchive/source/detail?r=3160">http://code.google.com/p/libarchive/source/detail?r=3160</a> [4] <a href="http://code.google.com/p/libarchive/source/detail?r=3038">http://code.google.com/p/libarchive/source/detail?r=3038</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Freebsd Libarchive | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.