Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5806-1

Debian Linux Security Advisory 5806-1 - A heap-based out-of-bounds write vulnerability was discovered in libarchive, a multi-format archive and compression library, which may result in the execution of arbitrary code if a specially crafted RAR archive is processed.

Packet Storm
#vulnerability#linux#debian
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5806-1                   [email protected]://www.debian.org/security/                     Salvatore BonaccorsoNovember 09, 2024                     https://www.debian.org/security/faq- -------------------------------------------------------------------------Package        : libarchiveCVE ID         : CVE-2024-20696Debian Bug     : 1086155A heap-based out-of-bounds write vulnerability was discovered inlibarchive, a multi-format archive and compression library, which mayresult in the execution of arbitrary code if a specially crafted RARarchive is processed.For the stable distribution (bookworm), this problem has been fixed inversion 3.6.2-1+deb12u2.We recommend that you upgrade your libarchive packages.For the detailed security status of libarchive please refer to itssecurity tracker page at:https://security-tracker.debian.org/tracker/libarchiveFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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2Rv1-----END PGP SIGNATURE-----

Related news

Ubuntu Security Notice USN-7087-1

Ubuntu Security Notice 7087-1 - It was discovered that libarchive incorrectly handled certain RAR archive files. If a user or automated system were tricked into processing a specially crafted RAR archive, an attacker could use this issue to cause libarchive to crash, resulting in a denial of service, or possibly execute arbitrary code.

Packet Storm: Latest News

Ivanti EPM Agent Portal Command Execution