blob: 9ba6d63108fdb11fc851825cc39d0743f9d245ec [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200708-03">
<title>libarchive (formerly named as bsdtar): Multiple PaX Extension Header Vulnerabilities</title>
Multiple vulnerabilities were found in libarchive (formerly named as
app-archive/bsdtar), possibly allowing for the execution of arbitrary code
or a Denial of Service.
<product type="ebuild">libarchive</product>
<announced>August 08, 2007</announced>
<revised>August 08, 2007: 02</revised>
<package name="app-arch/libarchive" auto="yes" arch="*">
<unaffected range="ge">2.2.4</unaffected>
<vulnerable range="lt">2.2.4</vulnerable>
libarchive is a library for manipulating different streaming archive
formats, including certain tar variants, several cpio formats, and both
BSD and GNU ar variants.
CPNI, CERT-FI, Tim Kientzle, and Colin Percival reported a buffer
overflow (CVE-2007-3641), an infinite loop (CVE-2007-3644), and a NULL
pointer dereference (CVE-2007-3645) within the processing of archives
having corrupted PaX extension headers.
<impact type="normal">
An attacker can trick a user or automated system to process an archive
with malformed PaX extension headers into execute arbitrary code, crash
an application using the library, or cause a high CPU load.
There is no known workaround at this time.
All libarchive or bsdtar users should upgrade to the latest libarchive
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-arch/libarchive-2.2.4&quot;</code>
<uri link="">CVE-2007-3641</uri>
<uri link="">CVE-2007-3644</uri>
<uri link="">CVE-2007-3645</uri>
<metadata tag="requester" timestamp="Sun, 15 Jul 2007 10:30:41 +0000">
<metadata tag="submitter" timestamp="Sun, 15 Jul 2007 19:19:38 +0000">
<metadata tag="bugReady" timestamp="Tue, 17 Jul 2007 17:56:39 +0000">