A vulnerability was found in libarchive. A crafted zip file can provide an incorrect compressed size, which may allow an attacker to place arbitrary code on the heap and execute it in the context of the current user. The user must be coerced into unzipping the crafted zip file. External references: http://www.kb.cert.org/vuls/id/862384 Upstream fix: https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7
Created libarchive tracking bugs for this issue: Affects: fedora-all [bug 1334213] Affects: epel-6 [bug 1334214]
Created libarchive tracking bugs for this issue: Affects: epel-5 [bug 1335466]
Cisco Talos advisory for this issue: http://www.talosintel.com/reports/TALOS-2016-0155/
Affected code was introduced via the following commit: https://github.com/libarchive/libarchive/commit/1399a59680fa2dfca68764468ed0bcaa0331fde7 It was first included in version 3.1.0, therefore libarchive packages in Red Hat Enterprise Linux 6 and EPEL-5, based on older libarchive versions, are not affected.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:1844 https://rhn.redhat.com/errata/RHSA-2016-1844.html