Skip to content

Commit 0f5a56f

Browse files
mbaumanjlsec-bot
authored andcommitted
[create-pull-request] automated change
1 parent fc85968 commit 0f5a56f

17 files changed

+416
-0
lines changed
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns68s11b-cadmb0"
4+
modified = 2025-10-19T19:26:25.343Z
5+
upstream = ["CVE-2021-36976"]
6+
references = ["http://seclists.org/fulldisclosure/2022/Mar/27", "http://seclists.org/fulldisclosure/2022/Mar/28", "http://seclists.org/fulldisclosure/2022/Mar/29", "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375", "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/", "https://security.gentoo.org/glsa/202208-26", "https://support.apple.com/kb/HT213182", "https://support.apple.com/kb/HT213183", "https://support.apple.com/kb/HT213193", "http://seclists.org/fulldisclosure/2022/Mar/27", "http://seclists.org/fulldisclosure/2022/Mar/28", "http://seclists.org/fulldisclosure/2022/Mar/29", "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375", "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/", "https://security.gentoo.org/glsa/202208-26", "https://support.apple.com/kb/HT213182", "https://support.apple.com/kb/HT213183", "https://support.apple.com/kb/HT213193"]
7+
8+
[[affected]]
9+
pkg = "LibArchive_jll"
10+
ranges = ["< 3.7.4+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2021-36976"
14+
imported = 2025-10-19T19:26:25.343Z
15+
modified = 2024-11-21T06:14:25.400Z
16+
published = 2021-07-20T07:15:07.950Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-36976"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2021-36976"
19+
```
20+
21+
# libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called from do_uncompress_block ...
22+
23+
libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called from do_uncompress_block and process_block).
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns68s11d-wqwurz"
4+
modified = 2025-10-19T19:26:25.345Z
5+
upstream = ["CVE-2021-23177"]
6+
references = ["https://access.redhat.com/security/cve/CVE-2021-23177", "https://bugzilla.redhat.com/show_bug.cgi?id=2024245", "https://github.com/libarchive/libarchive/commit/fba4f123cc456d2b2538f811bb831483bf336bad", "https://github.com/libarchive/libarchive/issues/1565", "https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html", "https://access.redhat.com/security/cve/CVE-2021-23177", "https://bugzilla.redhat.com/show_bug.cgi?id=2024245", "https://github.com/libarchive/libarchive/commit/fba4f123cc456d2b2538f811bb831483bf336bad", "https://github.com/libarchive/libarchive/issues/1565", "https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html"]
7+
8+
[[affected]]
9+
pkg = "LibArchive_jll"
10+
ranges = ["< 3.5.2+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2021-23177"
14+
imported = 2025-10-19T19:26:25.345Z
15+
modified = 2024-11-21T05:51:19.970Z
16+
published = 2022-08-23T16:15:09.280Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-23177"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2021-23177"
19+
```
20+
21+
# An improper link resolution flaw while extracting an archive can lead to changing the access control...
22+
23+
An improper link resolution flaw while extracting an archive can lead to changing the access control list (ACL) of the target of the link. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to change the ACL of a file on the system and gain more privileges.
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns68s11e-1m7ej8m"
4+
modified = 2025-10-19T19:26:25.346Z
5+
upstream = ["CVE-2021-31566"]
6+
references = ["https://access.redhat.com/security/cve/CVE-2021-31566", "https://bugzilla.redhat.com/show_bug.cgi?id=2024237", "https://github.com/libarchive/libarchive/commit/b41daecb5ccb4c8e3b2c53fd6147109fc12c3043", "https://github.com/libarchive/libarchive/issues/1566", "https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html", "https://access.redhat.com/security/cve/CVE-2021-31566", "https://bugzilla.redhat.com/show_bug.cgi?id=2024237", "https://github.com/libarchive/libarchive/commit/b41daecb5ccb4c8e3b2c53fd6147109fc12c3043", "https://github.com/libarchive/libarchive/issues/1566", "https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html"]
7+
8+
[[affected]]
9+
pkg = "LibArchive_jll"
10+
ranges = ["< 3.5.2+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2021-31566"
14+
imported = 2025-10-19T19:26:25.346Z
15+
modified = 2024-11-21T06:05:55.217Z
16+
published = 2022-08-23T16:15:09.337Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-31566"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2021-31566"
19+
```
20+
21+
# An improper link resolution flaw can occur while extracting an archive leading to changing modes, ti...
22+
23+
An improper link resolution flaw can occur while extracting an archive leading to changing modes, times, access control lists, and flags of a file outside of the archive. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to gain more privileges in a system.
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns68s11f-16fg9sm"
4+
modified = 2025-10-19T19:26:25.347Z
5+
upstream = ["CVE-2022-36227"]
6+
references = ["https://bugs.gentoo.org/882521", "https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215", "https://github.com/libarchive/libarchive/issues/1754", "https://lists.debian.org/debian-lts-announce/2023/01/msg00034.html", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/", "https://security.gentoo.org/glsa/202309-14", "https://bugs.gentoo.org/882521", "https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215", "https://github.com/libarchive/libarchive/issues/1754", "https://lists.debian.org/debian-lts-announce/2023/01/msg00034.html", "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/", "https://security.gentoo.org/glsa/202309-14"]
7+
8+
[[affected]]
9+
pkg = "LibArchive_jll"
10+
ranges = ["< 3.7.4+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2022-36227"
14+
imported = 2025-10-19T19:26:25.347Z
15+
modified = 2024-11-21T07:12:37.697Z
16+
published = 2022-11-22T02:15:11.003Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-36227"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2022-36227"
19+
```
20+
21+
# In libarchive before 3.6.2, the software does not check for an error after calling calloc function t...
22+
23+
In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns68s11g-19b5c6z"
4+
modified = 2025-10-19T19:26:25.348Z
5+
upstream = ["CVE-2023-30571"]
6+
references = ["https://github.com/libarchive/libarchive/issues/1876", "https://groups.google.com/g/libarchive-announce", "https://github.com/libarchive/libarchive/issues/1876", "https://groups.google.com/g/libarchive-announce"]
7+
8+
[[affected]]
9+
pkg = "LibArchive_jll"
10+
ranges = ["< 3.7.4+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2023-30571"
14+
imported = 2025-10-19T19:26:25.348Z
15+
modified = 2025-01-14T17:15:11.673Z
16+
published = 2023-05-29T20:15:09.513Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-30571"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2023-30571"
19+
```
20+
21+
# Libarchive through 3.6.2 can cause directories to have world-writable permissions
22+
23+
Libarchive through 3.6.2 can cause directories to have world-writable permissions. The umask() call inside archive_write_disk_posix.c changes the umask of the whole process for a very short period of time; a race condition with another thread can lead to a permanent umask 0 setting. Such a race condition could lead to implicit directory creation with permissions 0777 (without the sticky bit), which means that any low-privileged local user can delete and rename files inside those directories.
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns68s126-1tcks4h"
4+
modified = 2025-10-19T19:26:25.374Z
5+
upstream = ["CVE-2024-26256"]
6+
references = ["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26256", "http://www.openwall.com/lists/oss-security/2024/06/04/2", "http://www.openwall.com/lists/oss-security/2024/06/05/1", "https://github.com/LeSuisse/nixpkgs/commit/81b82a2934521dffef76f7ca305d8d4e22fe7262", "https://github.com/libarchive/libarchive/commit/eb7939b24a681a04648a59cdebd386b1e9dc9237.patch", "https://github.com/libarchive/libarchive/releases/tag/v3.7.4", "https://lists.fedoraproject.org/archives/list/[email protected]/message/EWANFZ6NEMXFCALXWI2AFKYBOLONAVFC/", "https://lists.fedoraproject.org/archives/list/[email protected]/message/TWAMR5TY47UKVYMWQXB34CWSBNTRYMBV/", "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26256", "https://www.openwall.com/lists/oss-security/2024/06/04/2"]
7+
8+
[[affected]]
9+
pkg = "LibArchive_jll"
10+
ranges = ["< 3.7.4+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2024-26256"
14+
imported = 2025-10-19T19:26:25.349Z
15+
modified = 2025-01-08T16:03:05.373Z
16+
published = 2024-04-09T17:15:47.507Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-26256"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2024-26256"
19+
```
20+
21+
# Libarchive Remote Code Execution Vulnerability
22+
23+
Libarchive Remote Code Execution Vulnerability
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns68s129-epe6u2"
4+
modified = 2025-10-19T19:26:25.377Z
5+
upstream = ["CVE-2024-48957"]
6+
references = ["https://github.com/libarchive/libarchive/compare/v3.7.4...v3.7.5", "https://github.com/libarchive/libarchive/pull/2149", "https://github.com/terrynini/CVE-Reports/blob/main/CVE-2024-48957/README.md"]
7+
8+
[[affected]]
9+
pkg = "LibArchive_jll"
10+
ranges = [">= 3.7.4+0, < 3.7.9+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2024-48957"
14+
imported = 2025-10-19T19:26:25.377Z
15+
modified = 2025-09-29T21:35:07.130Z
16+
published = 2024-10-10T02:15:02.990Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-48957"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2024-48957"
19+
```
20+
21+
# execute_filter_audio in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-b...
22+
23+
execute_filter_audio in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns68s12a-xxujrt"
4+
modified = 2025-10-19T19:26:25.378Z
5+
upstream = ["CVE-2024-48958"]
6+
references = ["https://github.com/libarchive/libarchive/compare/v3.7.4...v3.7.5", "https://github.com/libarchive/libarchive/pull/2148", "https://github.com/terrynini/CVE-Reports/tree/main/CVE-2024-48958"]
7+
8+
[[affected]]
9+
pkg = "LibArchive_jll"
10+
ranges = [">= 3.7.4+0, < 3.7.9+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2024-48958"
14+
imported = 2025-10-19T19:26:25.378Z
15+
modified = 2025-09-29T21:36:20.980Z
16+
published = 2024-10-10T02:15:03.057Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-48958"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2024-48958"
19+
```
20+
21+
# execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-b...
22+
23+
execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because src can move beyond dst.
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns68s12b-1ltikks"
4+
modified = 2025-10-19T19:26:25.379Z
5+
upstream = ["CVE-2025-25724"]
6+
references = ["https://gist.github.com/Ekkosun/a83870ce7f3b7813b9b462a395e8ad92", "https://github.com/Ekkosun/pocs/blob/main/bsdtarbug", "https://github.com/libarchive/libarchive/blob/b439d586f53911c84be5e380445a8a259e19114c/tar/util.c#L751-L752"]
7+
8+
[[affected]]
9+
pkg = "LibArchive_jll"
10+
ranges = ["< 3.7.9+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2025-25724"
14+
imported = 2025-10-19T19:26:25.379Z
15+
modified = 2025-07-17T15:56:36.083Z
16+
published = 2025-03-02T02:15:36.603Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-25724"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2025-25724"
19+
```
20+
21+
# list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value,...
22+
23+
list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.
24+
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
```toml
2+
schema_version = "1.7.3"
3+
id = "JLSEC-0000-mns68s12b-1on5p9b"
4+
modified = 2025-10-19T19:26:25.379Z
5+
upstream = ["CVE-2025-1632"]
6+
references = ["https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc", "https://vuldb.com/?ctiid.296619", "https://vuldb.com/?id.296619", "https://vuldb.com/?submit.496460", "https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc"]
7+
8+
[[affected]]
9+
pkg = "LibArchive_jll"
10+
ranges = ["< 3.7.9+0"]
11+
12+
[[jlsec_sources]]
13+
id = "CVE-2025-1632"
14+
imported = 2025-10-19T19:26:25.379Z
15+
modified = 2025-03-25T15:41:41.683Z
16+
published = 2025-02-24T14:15:11.590Z
17+
url = "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-1632"
18+
html_url = "https://nvd.nist.gov/vuln/detail/CVE-2025-1632"
19+
```
20+
21+
# A vulnerability was found in libarchive up to 3.7.7
22+
23+
A vulnerability was found in libarchive up to 3.7.7. It has been classified as problematic. This affects the function list of the file bsdunzip.c. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
24+

0 commit comments

Comments
 (0)