First published: Thu Jun 16 2016(Updated: )
A specially crafted gzip file can cause libarchive to allocate memory without limit, eventually leading to a crash. External references: <a href="https://github.com/libarchive/libarchive/issues/660">https://github.com/libarchive/libarchive/issues/660</a> Upstream fix: <a href="https://github.com/libarchive/libarchive/commit/6e06b1c89">https://github.com/libarchive/libarchive/commit/6e06b1c89</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libarchive | <3.2.0 | 3.2.0 |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.2 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Oracle Libarchive | <=3.1.901a | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Oracle Linux | =6 | |
Oracle Linux | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7166 has been classified with high severity due to potential crashes caused by specially crafted gzip files.
To fix CVE-2016-7166, update libarchive to version 3.2.0 or later.
CVE-2016-7166 affects multiple versions of libarchive and various Red Hat Enterprise Linux distributions.
CVE-2016-7166 is a memory allocation vulnerability that can lead to application crashes when processing malformed gzip files.
Yes, CVE-2016-7166 can potentially be exploited remotely by sending carefully crafted gzip files.