The archive_read_format_cpio_read_header function in archive_read_support_format_cpio.c in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a CPIO archive with a large symlink.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://github.com/libarchive/libarchive/commit/fd7e0c02 | patch issue tracking |
http://rhn.redhat.com/errata/RHSA-2016-1844.html | third party advisory vendor advisory |
https://github.com/libarchive/libarchive/issues/705 | patch issue tracking |
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html | third party advisory |
http://www.securityfocus.com/bid/91813 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1347084 | issue tracking |
http://rhn.redhat.com/errata/RHSA-2016-1850.html | third party advisory vendor advisory |
https://security.gentoo.org/glsa/201701-03 | vendor advisory |
http://www.debian.org/security/2016/dsa-3657 | vendor advisory |