libarchive heap-based buffer overflow due to improper input validatio
Reporter | Title | Published | Views | Family All 66 |
---|---|---|---|---|
![]() | [SECURITY] Fedora 24 Update: libarchive-3.1.2-17.fc24 | 14 May 201623:33 | – | fedora |
![]() | [SECURITY] Fedora 23 Update: libarchive-3.1.2-15.fc23 | 16 May 201622:29 | – | fedora |
![]() | [SECURITY] Fedora 22 Update: libarchive-3.1.2-14.fc22 | 31 May 201609:24 | – | fedora |
![]() | libarchive - security update | 10 May 201600:00 | – | osv |
![]() | CVE-2016-1541 | 7 May 201610:59 | – | osv |
![]() | OPENSUSE-SU-2024:10127-1 bsdtar-3.2.2-2.1 on GA media | 15 Jun 202400:00 | – | osv |
![]() | RHSA-2016:1844 Red Hat Security Advisory: libarchive security update | 15 Sep 202423:36 | – | osv |
![]() | Updated libarchive packages fix CVE-2016-1541 | 18 May 201623:14 | – | mageia |
![]() | Slackware 14.1 / current : libarchive (SSA:2016-145-01) | 25 May 201600:00 | – | nessus |
![]() | Debian DSA-3574-1 : libarchive - security update | 12 May 201600:00 | – | nessus |
Source | Link |
---|---|
github | www.github.com/libarchive/libarchive/issues/656 |
libarchive | www.libarchive.org/ |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo