Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <201105061437.54933.thomas@suse.de>
Date: Fri, 6 May 2011 14:37:54 +0200
From: Thomas Biege <thomas@...e.de>
To: oss-security@...ts.openwall.com
Subject: CVE request: libarchive, multiple overflows

Hello,
our maintainer found the following patches:
-----------
I was doing some maintainance on bsdtar package and noticed that there was a
buffer overflow fix upstream, see
http://code.google.com/p/libarchive/source/detail?r=3158&path=/trunk/libarchive/archive_read_support_format_iso9660.c

Also SUSE package does not include the
http://pkgs.fedoraproject.org/gitweb/?p=libarchive.git;a=blob_plain;f=libarchive-2.8.4-iso9660-data-types.patch;hb=HEAD
patch which seems to be security sensitive also.
----------
More overflow fixes:

http://code.google.com/p/libarchive/source/detail?r=2842
http://code.google.com/p/libarchive/source/detail?r=3160

Use-after-free fix (not sure if exploitable):

http://code.google.com/p/libarchive/source/detail?r=3038
----------

Cheers,
Thomas


-- 
Thomas Biege <thomas@...e.de>, SUSE LINUX, Security Support & Auditing
SUSE LINUX GmbH, GF: Jeff Hawn, Jennifer Guild, Felix Imendörffer, HRB 21284 (AG Nürnberg
--
  Wer aufhoert besser werden zu wollen, hoert auf gut zu sein.
                            -- Marie von Ebner-Eschenbach

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.