|
|
Subscribe / Log in / New account

Debian alert DLA-1006-1 (libarchive)

From:  Raphael Hertzog <hertzog@debian.org>
To:  debian-lts-announce@lists.debian.org
Subject:  [SECURITY] [DLA 1006-1] libarchive security update
Date:  Fri, 30 Jun 2017 11:53:12 +0200
Message-ID:  <20170630095312.2nazc2ar3jxvr5a6@home.ouaza.com>

Package : libarchive Version : 3.0.4-3+wheezy6 CVE ID : CVE-2016-10209 CVE-2016-10349 CVE-2016-10350 Debian Bug : 859456 861609 Multiple denial of services vulnerabilities have been identified in libarchive when manipulating specially crafted archives. CVE-2016-10209 NULL pointer dereference and application crash in the archive_wstring_append_from_mbs() function. CVE-2016-10349 Heap-based buffer over-read and application crash in the archive_le32dec() function. CVE-2016-10350 Heap-based buffer over-read and application crash in the archive_read_format_cab_read_header() function. For Debian 7 "Wheezy", these problems have been fixed in version 3.0.4-3+wheezy6. We recommend that you upgrade your libarchive packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -- Raphaël Hertzog ◈ Debian Developer Support Debian LTS: https://www.freexian.com/services/debian-lts.html Learn to master Debian: https://debian-handbook.info/get/


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds