A heap-based buffer overflow flaw was found in the rar e8 filter in libarchive. An attacker could trick a user into opening a specially crafted rar archive to induce a denial of service or arbitrary code execution in the context of the application using libarchive. References: https://github.com/advisories/GHSA-2jc9-36w4-pmqw https://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability Upstream patch: https://github.com/libarchive/libarchive/pull/2135
Created cmake3 tracking bugs for this issue: Affects: epel-7 [bug 2282528] Created libarchive tracking bugs for this issue: Affects: fedora-39 [bug 2282529] Affects: fedora-40 [bug 2282527] Created mingw-libarchive tracking bugs for this issue: Affects: fedora-39 [bug 2282530] Affects: fedora-40 [bug 2282531]
*** Bug 2290446 has been marked as a duplicate of this bug. ***