summaryrefslogtreecommitdiffstats
path: root/package/perl-class-std-fast/perl-class-std-fast.hash
diff options
context:
space:
mode:
authorThomas De Schampheleire <thomas.de_schampheleire@nokia.com>2019-01-25 19:50:52 +0100
committerPeter Korsgaard <peter@korsgaard.com>2019-01-27 21:26:20 +0100
commit17ba24bac10b4f09820259f442e4f7e1e59c1b2d (patch)
tree5eaf1d1d7e05853c5bea4c47b49451ef56f9bf49 /package/perl-class-std-fast/perl-class-std-fast.hash
parentafffba5cd790b35c36e8ee1648422cd71c54790b (diff)
downloadbuildroot-17ba24bac10b4f09820259f442e4f7e1e59c1b2d.tar.gz
buildroot-17ba24bac10b4f09820259f442e4f7e1e59c1b2d.zip
package/libarchive: add four security patches
Add backported patches for the following four security issues in libarchive. There is no new release yet including these patches. - CVE-2018-1000877 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000877) "libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar->lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted RAR archive." - CVE-2018-1000878 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000878) "libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive." - CVE-2018-1000879 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000879) "libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted archive file." - CVE-2018-1000880 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000880) "libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This attack appear to be exploitable via the victim must open a specially crafted WARC file." Signed-off-by: Thomas De Schampheleire <thomas.de_schampheleire@nokia.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Diffstat (limited to 'package/perl-class-std-fast/perl-class-std-fast.hash')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud