Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68s11b-cadmb0.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68s11b-cadmb0"
modified = 2025-10-19T19:26:25.343Z
upstream = ["CVE-2021-36976"]
references = ["http://seclists.org/fulldisclosure/2022/Mar/27", "http://seclists.org/fulldisclosure/2022/Mar/28", "http://seclists.org/fulldisclosure/2022/Mar/29", "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375", "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/", "https://security.gentoo.org/glsa/202208-26", "https://support.apple.com/kb/HT213182", "https://support.apple.com/kb/HT213183", "https://support.apple.com/kb/HT213193", "http://seclists.org/fulldisclosure/2022/Mar/27", "http://seclists.org/fulldisclosure/2022/Mar/28", "http://seclists.org/fulldisclosure/2022/Mar/29", "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375", "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/", "https://security.gentoo.org/glsa/202208-26", "https://support.apple.com/kb/HT213182", "https://support.apple.com/kb/HT213183", "https://support.apple.com/kb/HT213193"]

[[affected]]
pkg = "LibArchive_jll"
ranges = ["< 3.7.4+0"]

[[jlsec_sources]]
id = "CVE-2021-36976"
imported = 2025-10-19T19:26:25.343Z
modified = 2024-11-21T06:14:25.400Z
published = 2021-07-20T07:15:07.950Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-36976"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2021-36976"
```

# libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called from do_uncompress_block ...

libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called from do_uncompress_block and process_block).

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68s11d-wqwurz.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68s11d-wqwurz"
modified = 2025-10-19T19:26:25.345Z
upstream = ["CVE-2021-23177"]
references = ["https://access.redhat.com/security/cve/CVE-2021-23177", "https://bugzilla.redhat.com/show_bug.cgi?id=2024245", "https://github.com/libarchive/libarchive/commit/fba4f123cc456d2b2538f811bb831483bf336bad", "https://github.com/libarchive/libarchive/issues/1565", "https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html", "https://access.redhat.com/security/cve/CVE-2021-23177", "https://bugzilla.redhat.com/show_bug.cgi?id=2024245", "https://github.com/libarchive/libarchive/commit/fba4f123cc456d2b2538f811bb831483bf336bad", "https://github.com/libarchive/libarchive/issues/1565", "https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html"]

[[affected]]
pkg = "LibArchive_jll"
ranges = ["< 3.5.2+0"]

[[jlsec_sources]]
id = "CVE-2021-23177"
imported = 2025-10-19T19:26:25.345Z
modified = 2024-11-21T05:51:19.970Z
published = 2022-08-23T16:15:09.280Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-23177"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2021-23177"
```

# An improper link resolution flaw while extracting an archive can lead to changing the access control...

An improper link resolution flaw while extracting an archive can lead to changing the access control list (ACL) of the target of the link. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to change the ACL of a file on the system and gain more privileges.

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68s11e-1m7ej8m.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68s11e-1m7ej8m"
modified = 2025-10-19T19:26:25.346Z
upstream = ["CVE-2021-31566"]
references = ["https://access.redhat.com/security/cve/CVE-2021-31566", "https://bugzilla.redhat.com/show_bug.cgi?id=2024237", "https://github.com/libarchive/libarchive/commit/b41daecb5ccb4c8e3b2c53fd6147109fc12c3043", "https://github.com/libarchive/libarchive/issues/1566", "https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html", "https://access.redhat.com/security/cve/CVE-2021-31566", "https://bugzilla.redhat.com/show_bug.cgi?id=2024237", "https://github.com/libarchive/libarchive/commit/b41daecb5ccb4c8e3b2c53fd6147109fc12c3043", "https://github.com/libarchive/libarchive/issues/1566", "https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html"]

[[affected]]
pkg = "LibArchive_jll"
ranges = ["< 3.5.2+0"]

[[jlsec_sources]]
id = "CVE-2021-31566"
imported = 2025-10-19T19:26:25.346Z
modified = 2024-11-21T06:05:55.217Z
published = 2022-08-23T16:15:09.337Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-31566"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2021-31566"
```

# An improper link resolution flaw can occur while extracting an archive leading to changing modes, ti...

An improper link resolution flaw can occur while extracting an archive leading to changing modes, times, access control lists, and flags of a file outside of the archive. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to gain more privileges in a system.

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68s11f-16fg9sm.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68s11f-16fg9sm"
modified = 2025-10-19T19:26:25.347Z
upstream = ["CVE-2022-36227"]
references = ["https://bugs.gentoo.org/882521", "https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215", "https://github.com/libarchive/libarchive/issues/1754", "https://lists.debian.org/debian-lts-announce/2023/01/msg00034.html", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/", "https://security.gentoo.org/glsa/202309-14", "https://bugs.gentoo.org/882521", "https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215", "https://github.com/libarchive/libarchive/issues/1754", "https://lists.debian.org/debian-lts-announce/2023/01/msg00034.html", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/", "https://security.gentoo.org/glsa/202309-14"]

[[affected]]
pkg = "LibArchive_jll"
ranges = ["< 3.7.4+0"]

[[jlsec_sources]]
id = "CVE-2022-36227"
imported = 2025-10-19T19:26:25.347Z
modified = 2024-11-21T07:12:37.697Z
published = 2022-11-22T02:15:11.003Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-36227"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2022-36227"
```

# In libarchive before 3.6.2, the software does not check for an error after calling calloc function t...

In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68s11g-19b5c6z.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68s11g-19b5c6z"
modified = 2025-10-19T19:26:25.348Z
upstream = ["CVE-2023-30571"]
references = ["https://github.com/libarchive/libarchive/issues/1876", "https://groups.google.com/g/libarchive-announce", "https://github.com/libarchive/libarchive/issues/1876", "https://groups.google.com/g/libarchive-announce"]

[[affected]]
pkg = "LibArchive_jll"
ranges = ["< 3.7.4+0"]

[[jlsec_sources]]
id = "CVE-2023-30571"
imported = 2025-10-19T19:26:25.348Z
modified = 2025-01-14T17:15:11.673Z
published = 2023-05-29T20:15:09.513Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-30571"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2023-30571"
```

# Libarchive through 3.6.2 can cause directories to have world-writable permissions

Libarchive through 3.6.2 can cause directories to have world-writable permissions. The umask() call inside archive_write_disk_posix.c changes the umask of the whole process for a very short period of time; a race condition with another thread can lead to a permanent umask 0 setting. Such a race condition could lead to implicit directory creation with permissions 0777 (without the sticky bit), which means that any low-privileged local user can delete and rename files inside those directories.

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68s126-1tcks4h.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68s126-1tcks4h"
modified = 2025-10-19T19:26:25.374Z
upstream = ["CVE-2024-26256"]
references = ["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26256", "http://www.openwall.com/lists/oss-security/2024/06/04/2", "http://www.openwall.com/lists/oss-security/2024/06/05/1", "https://github.com/LeSuisse/nixpkgs/commit/81b82a2934521dffef76f7ca305d8d4e22fe7262", "https://github.com/libarchive/libarchive/commit/eb7939b24a681a04648a59cdebd386b1e9dc9237.patch", "https://github.com/libarchive/libarchive/releases/tag/v3.7.4", "https://lists.fedoraproject.org/archives/list/[email protected]/message/EWANFZ6NEMXFCALXWI2AFKYBOLONAVFC/", "https://lists.fedoraproject.org/archives/list/[email protected]/message/TWAMR5TY47UKVYMWQXB34CWSBNTRYMBV/", "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26256", "https://www.openwall.com/lists/oss-security/2024/06/04/2"]

[[affected]]
pkg = "LibArchive_jll"
ranges = ["< 3.7.4+0"]

[[jlsec_sources]]
id = "CVE-2024-26256"
imported = 2025-10-19T19:26:25.349Z
modified = 2025-01-08T16:03:05.373Z
published = 2024-04-09T17:15:47.507Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-26256"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2024-26256"
```

# Libarchive Remote Code Execution Vulnerability

Libarchive Remote Code Execution Vulnerability

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68s129-epe6u2.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68s129-epe6u2"
modified = 2025-10-19T19:26:25.377Z
upstream = ["CVE-2024-48957"]
references = ["https://github.com/libarchive/libarchive/compare/v3.7.4...v3.7.5", "https://github.com/libarchive/libarchive/pull/2149", "https://github.com/terrynini/CVE-Reports/blob/main/CVE-2024-48957/README.md"]

[[affected]]
pkg = "LibArchive_jll"
ranges = [">= 3.7.4+0, < 3.7.9+0"]

[[jlsec_sources]]
id = "CVE-2024-48957"
imported = 2025-10-19T19:26:25.377Z
modified = 2025-09-29T21:35:07.130Z
published = 2024-10-10T02:15:02.990Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-48957"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2024-48957"
```

# execute_filter_audio in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-b...

execute_filter_audio in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68s12a-xxujrt.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68s12a-xxujrt"
modified = 2025-10-19T19:26:25.378Z
upstream = ["CVE-2024-48958"]
references = ["https://github.com/libarchive/libarchive/compare/v3.7.4...v3.7.5", "https://github.com/libarchive/libarchive/pull/2148", "https://github.com/terrynini/CVE-Reports/tree/main/CVE-2024-48958"]

[[affected]]
pkg = "LibArchive_jll"
ranges = [">= 3.7.4+0, < 3.7.9+0"]

[[jlsec_sources]]
id = "CVE-2024-48958"
imported = 2025-10-19T19:26:25.378Z
modified = 2025-09-29T21:36:20.980Z
published = 2024-10-10T02:15:03.057Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-48958"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2024-48958"
```

# execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-b...

execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68s12b-1ltikks.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68s12b-1ltikks"
modified = 2025-10-19T19:26:25.379Z
upstream = ["CVE-2025-25724"]
references = ["https://gist.github.com/Ekkosun/a83870ce7f3b7813b9b462a395e8ad92", "https://github.com/Ekkosun/pocs/blob/main/bsdtarbug", "https://github.com/libarchive/libarchive/blob/b439d586f53911c84be5e380445a8a259e19114c/tar/util.c#L751-L752"]

[[affected]]
pkg = "LibArchive_jll"
ranges = ["< 3.7.9+0"]

[[jlsec_sources]]
id = "CVE-2025-25724"
imported = 2025-10-19T19:26:25.379Z
modified = 2025-07-17T15:56:36.083Z
published = 2025-03-02T02:15:36.603Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-25724"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2025-25724"
```

# list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value,...

list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68s12b-1on5p9b.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68s12b-1on5p9b"
modified = 2025-10-19T19:26:25.379Z
upstream = ["CVE-2025-1632"]
references = ["https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc", "https://vuldb.com/?ctiid.296619", "https://vuldb.com/?id.296619", "https://vuldb.com/?submit.496460", "https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc"]

[[affected]]
pkg = "LibArchive_jll"
ranges = ["< 3.7.9+0"]

[[jlsec_sources]]
id = "CVE-2025-1632"
imported = 2025-10-19T19:26:25.379Z
modified = 2025-03-25T15:41:41.683Z
published = 2025-02-24T14:15:11.590Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-1632"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2025-1632"
```

# A vulnerability was found in libarchive up to 3.7.7

A vulnerability was found in libarchive up to 3.7.7. It has been classified as problematic. This affects the function list of the file bsdunzip.c. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68s12c-1ht52i0.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68s12c-1ht52i0"
modified = 2025-10-19T19:26:25.380Z
upstream = ["CVE-2024-48615"]
references = ["https://github.com/88Sanghy88/crash-test", "https://github.com/libarchive/libarchive/releases/download/v3.7.6/libarchive-3.7.6.tar.gz", "https://github.com/88Sanghy88/crash-test"]

[[affected]]
pkg = "LibArchive_jll"
ranges = ["< 3.7.9+0"]

[[jlsec_sources]]
id = "CVE-2024-48615"
imported = 2025-10-19T19:26:25.380Z
modified = 2025-04-14T14:36:30.827Z
published = 2025-03-28T15:15:45.023Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-48615"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2024-48615"
```

# Null Pointer Dereference vulnerability in libarchive 3.7.6 and earlier when running program bsdtar i...

Null Pointer Dereference vulnerability in libarchive 3.7.6 and earlier when running program bsdtar in function header_pax_extension at rchive_read_support_format_tar.c:1844:8.

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68s12d-zhzsnx.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68s12d-zhzsnx"
modified = 2025-10-19T19:26:25.381Z
upstream = ["CVE-2025-5914"]
references = ["https://access.redhat.com/errata/RHSA-2025:14130", "https://access.redhat.com/errata/RHSA-2025:14135", "https://access.redhat.com/errata/RHSA-2025:14137", "https://access.redhat.com/errata/RHSA-2025:14141", "https://access.redhat.com/errata/RHSA-2025:14142", "https://access.redhat.com/errata/RHSA-2025:14525", "https://access.redhat.com/errata/RHSA-2025:14528", "https://access.redhat.com/errata/RHSA-2025:14594", "https://access.redhat.com/errata/RHSA-2025:14644", "https://access.redhat.com/errata/RHSA-2025:14808", "https://access.redhat.com/errata/RHSA-2025:14810", "https://access.redhat.com/errata/RHSA-2025:14828", "https://access.redhat.com/errata/RHSA-2025:15024", "https://access.redhat.com/errata/RHSA-2025:15709", "https://access.redhat.com/errata/RHSA-2025:15827", "https://access.redhat.com/errata/RHSA-2025:15828", "https://access.redhat.com/errata/RHSA-2025:16524", "https://access.redhat.com/errata/RHSA-2025:18219", "https://access.redhat.com/security/cve/CVE-2025-5914", "https://bugzilla.redhat.com/show_bug.cgi?id=2370861", "https://github.com/libarchive/libarchive/pull/2598", "https://github.com/libarchive/libarchive/releases/tag/v3.8.0", "https://github.com/libarchive/libarchive/pull/2598"]

[[affected]]
pkg = "LibArchive_jll"
ranges = ["< 3.8.0+0"]

[[jlsec_sources]]
id = "CVE-2025-5914"
imported = 2025-10-19T19:26:25.381Z
modified = 2025-10-16T09:15:35.380Z
published = 2025-06-09T20:15:26.123Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-5914"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2025-5914"
```

# A vulnerability has been identified in the libarchive library, specifically within the archive_read_...

A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.

24 changes: 24 additions & 0 deletions advisories/published/2025/JLSEC-0000-mns68s12e-ffc4an.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
```toml
schema_version = "1.7.3"
id = "JLSEC-0000-mns68s12e-ffc4an"
modified = 2025-10-19T19:26:25.382Z
upstream = ["CVE-2025-5915"]
references = ["https://access.redhat.com/security/cve/CVE-2025-5915", "https://bugzilla.redhat.com/show_bug.cgi?id=2370865", "https://github.com/libarchive/libarchive/pull/2599", "https://github.com/libarchive/libarchive/releases/tag/v3.8.0"]

[[affected]]
pkg = "LibArchive_jll"
ranges = ["< 3.8.0+0"]

[[jlsec_sources]]
id = "CVE-2025-5915"
imported = 2025-10-19T19:26:25.382Z
modified = 2025-08-25T02:28:51.487Z
published = 2025-06-09T20:15:26.317Z
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-5915"
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2025-5915"
```

# A vulnerability has been identified in the libarchive library

A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.

Loading
Loading