[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH 0/1] libarchive: Fix CVE-2016-1541
From: |
Ludovic Courtès |
Subject: |
Re: [PATCH 0/1] libarchive: Fix CVE-2016-1541 |
Date: |
Wed, 11 May 2016 15:44:59 +0200 |
User-agent: |
Gnus/5.13 (Gnus v5.13) Emacs/24.5 (gnu/linux) |
Leo Famulari <address@hidden> skribis:
> There is a buffer overflow in libarchive, CVE-2016-1541 [0]. According
> to MITRE description, it "allows remote attackers to execute arbitrary
> code via crafted entry-size values in a ZIP archive."
>
> Yikes!
>
> This patch applies the upstream patch [1].
>
> Requesting your review, since soooo many packages depend on libarchive.
LGTM.
> I will follow this commit with an "ungrafting" commit on core-updates.
Cool!
Thank you!
Ludo’.
- [PATCH 0/1] libarchive: Fix CVE-2016-1541, Leo Famulari, 2016/05/10
- [PATCH 1/1] gnu: libarchive: Fix CVE-2016-1541., Leo Famulari, 2016/05/10
- Re: [PATCH 0/1] libarchive: Fix CVE-2016-1541,
Ludovic Courtès <=
- Re: [PATCH 0/1] libarchive: Fix CVE-2016-1541, Leo Famulari, 2016/05/11
- Re: [PATCH 0/1] libarchive: Fix CVE-2016-1541, Manolis Ragkousis, 2016/05/12
- Re: [PATCH 0/1] libarchive: Fix CVE-2016-1541, Jan Nieuwenhuizen, 2016/05/12
- Re: [PATCH 0/1] libarchive: Fix CVE-2016-1541, Leo Famulari, 2016/05/13
- Re: [PATCH 0/1] libarchive: Fix CVE-2016-1541, Jan Nieuwenhuizen, 2016/05/13
- Re: [PATCH 0/1] libarchive: Fix CVE-2016-1541, Manolis Ragkousis, 2016/05/14
Re: [PATCH 0/1] libarchive: Fix CVE-2016-1541, Leo Famulari, 2016/05/15