The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Libarchive
Subscribe
|
Libarchive
Subscribe
|
|
Oracle
Subscribe
|
Linux
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Hpc Node
Subscribe
Enterprise Linux Hpc Node Eus
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Eus
Subscribe
Enterprise Linux Workstation
Subscribe
Openshift
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-657-1 | libarchive security update |
Debian DSA |
DSA-3677-1 | libarchive security update |
EUVD |
EUVD-2016-6363 | The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file. |
Ubuntu USN |
USN-3225-1 | libarchive vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T01:00:59.971Z
Reserved: 2016-06-10T00:00:00
Link: CVE-2016-5418
No data.
Status : Deferred
Published: 2016-09-21T14:25:13.457
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-5418
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN