First published: Sun Jun 26 2016(Updated: )
Hanno Böck has disclosed another Undefined Behaviour (signed integer overflow) on oss-security: <a href="http://seclists.org/oss-sec/2016/q2/591">http://seclists.org/oss-sec/2016/q2/591</a> Upstream ticket: <a href="https://github.com/libarchive/libarchive/issues/717">https://github.com/libarchive/libarchive/issues/717</a> Upstream fix (released in libarchive-3.2.1): <a href="https://github.com/libarchive/libarchive/commit/3ad08e0">https://github.com/libarchive/libarchive/commit/3ad08e0</a> While the UB exists in 3.2.0, an earlier patch seems to mitigate against the issue: <a href="https://github.com/libarchive/libarchive/commit/e6c9668f">https://github.com/libarchive/libarchive/commit/e6c9668f</a> This function is called immediately after the overflow, and will immediately reject a negative skipsize with ARCHIVE_FATAL, skipping all further processing. Previous releases up to and including 3.1.2 (including 2.8.3, 2.8.4) do not include the mitigation and are thus likely vulnerable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libarchive | <3.2.1 | 3.2.1 |
Oracle Libarchive | <=3.2.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.2 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Oracle Linux | =6 | |
Oracle Linux | =7 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5844 is classified as a high severity vulnerability due to the potential for exploitation through signed integer overflow.
To mitigate CVE-2016-5844, update to libarchive version 3.2.1 or later.
CVE-2016-5844 affects libarchive versions prior to 3.2.1.
Yes, CVE-2016-5844 can impact Red Hat Enterprise Linux version 6.0 and 7.0 as well as specific applications built on older versions of libarchive.
As of now, public details about an exploit specifically targeting CVE-2016-5844 have not been disclosed.