Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.
lists.opensuse.org/opensuse-updates/2016-06/msg00003.html
lists.opensuse.org/opensuse-updates/2016-06/msg00090.html
rhn.redhat.com/errata/RHSA-2016-1844.html
www.debian.org/security/2016/dsa-3574
www.kb.cert.org/vuls/id/862384
www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
www.securityfocus.com/bid/89355
www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.352685
www.ubuntu.com/usn/USN-2981-1
github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7
github.com/libarchive/libarchive/issues/656
security.gentoo.org/glsa/201701-03