Bug 1385659 - libarchive: Stack based buffer overflow in bsdtar_expand_char
Summary: libarchive: Stack based buffer overflow in bsdtar_expand_char
Status: CLOSED DUPLICATE of bug 1377926
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20161015,repor...
Keywords: Security
Depends On: 1378666 1385673
Blocks: 1385672
TreeView+ depends on / blocked
 
Reported: 2016-10-17 13:02 UTC by Adam Mariš
Modified: 2019-06-08 21:31 UTC (History)
7 users (show)

(edit)
Clone Of:
(edit)
Last Closed: 2016-10-18 04:30:54 UTC


Attachments (Terms of Use)

Description Adam Mariš 2016-10-17 13:02:19 UTC
Stack based buffer overflow vulnerability was found in bsdtar_expand_char in util.c by invoking bsdtar on crafted file. It occurs when trying to format a non-printable multibyte character that overflows 20-byte buffer in safe_fprintf.

Upstream patch:

https://github.com/libarchive/libarchive/commit/e37b620fe8f14535d737e89a4dcabaed4517bf1a

CVE assignment:

http://seclists.org/oss-sec/2016/q4/152

Comment 1 Adam Mariš 2016-10-17 13:24:42 UTC
Created libarchive3 tracking bugs for this issue:

Affects: epel-6 [bug 1385676]

Comment 2 Adam Mariš 2016-10-17 13:24:49 UTC
Created mingw-libarchive tracking bugs for this issue:

Affects: fedora-all [bug 1385674]

Comment 3 Adam Mariš 2016-10-17 13:24:56 UTC
Created libarchive tracking bugs for this issue:

Affects: fedora-all [bug 1385673]
Affects: epel-5 [bug 1385675]

Comment 4 Doran Moppert 2016-10-18 04:30:54 UTC

*** This bug has been marked as a duplicate of bug 1377926 ***


Note You need to log in before you can comment on or make changes to this bug.