#12199: libarchive-3.4.0
-------------------------+-----------------------
Reporter: renodr | Owner: blfs-book
Type: enhancement | Status: new
Priority: high | Milestone: 8.5
Component: BOOK | Version: SVN
Severity: normal | Keywords:
-------------------------+-----------------------
New minor version
[https://github.com/libarchive/libarchive/releases] - look here, I was
tipped off by Arch
{{{
Libarchive 3.4.0 is a feature and security release.
Feature higlights:
Support for file and directory symlinks on Windows
Read support for RAR 5.0 archives
Read support for ZIPX archives with xz, lzma, ppmd8 and bzip2
compression
Support for non-recursive list and extract
New tar option: --exclude-vcs
Improved file attribute support on Linux and file flags support on
FreeBSD
64-bit ar format support
Important bugfixes:
fix reading Android APK archives (#1055 )
fix problems related to unreadable directories (#1167)
patches from OpenBSD to libarchive_fe/passphrase.c
support extracting ACLs with in-entry comments (#1096)
support extracting extattrs as non-root on non-user-writable files
(#1023)
a two-digit number of OSS-Fuzz issues was resolved in this release
various resource leak, use-after-free and crash fixes
Thanks to all contributors and bug reporters for making libarchive such a
great piece of software.
Special thanks to @antekone for implementing RAR 5.0 reader and ZIPX
decompression support.
}}}
[https://github.com/libarchive/libarchive/issues/1216] - explanation as to
why we can't find it
{{{
CVE-2018-1000877
A double-free issue has been found in libarchive >= 3.1.0 and <=3.3.3, in
the parse_codes() function in archive_read_support_format_rar.c. An
attacker can use a specially crafted RAR file to cause a call to realloc
with a size of 0, effectively freeing the memory which will be freed again
at a later time.
CVE-2018-1000878
A use-after-free issue has been found in libarchive >= 3.1.0 and <=3.3.3,
in the archive_read_format_rar_read_header() function in
archive_read_support_format_rar.c. An attacker can use a specially crafted
RAR file to cause the vulnerable function to free the buffer and allocate
a new one, causing the ppmd7 decoder to continue reading from and writing
to the freed buffer.
CVE-2018-1000879
A NULL-pointer dereference issue has been found in libarchive >= 3.3.0 and
<=3.3.3, in the archive_acl_from_text_l() function in archive_acl.c. An
attacker can use a specially crafted archive file to cause a crash via a
malformed ACL.
CVE-2018-1000880
A resource consumption issue has been found in libarchive >= 3.2.0 and
<=3.3.3, in the _warc_read() function in
archive_read_support_format_warm.c. An attacker can use a specially
crafted WARC file to cause quasi-infinite run time and disk usage from a
tiny file.
CVE-2019-1000019
libarchive version >=v3.0.2 contains a CWE-125: Out-of-bounds Read
vulnerability in 7zip decompression, archive_read_support_format_7zip.c,
header_bytes() that can result in a crash (denial of service). This attack
appears to be exploitable via the victim opening a specially crafted 7zip
file.
CVE-2019-1000020
libarchive version >=v2.8.0 contains a CWE-835: Loop with Unreachable Exit
Condition ('Infinite Loop') vulnerability in ISO9660 parser,
archive_read_support_format_iso9660.c, read_CE()/parse_rockridge() that
can result in DoS by infinite loop. This attack appears to be exploitable
via the victim opening a specially crafted ISO9660 file.
}}}
--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/12199>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
--
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page