View | Details | Raw Unified | Return to bug 244474
Collapse All | Expand All

(-)security/vuxml/vuln.xml (+32 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="3a17c4ef-5989-11ea-bc19-9c5c8e75236a">
62
    <topic>libarchive -- SIGSEGV or possibly unspecified other impact</topic>
63
    <affects>
64
      <package>
65
	<name>libarchive</name>
66
	<range><lt>3.4.2,1</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>MITRE Corporation reports:</p>
72
	<blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9308">
73
	  <p>
74
	    archive_read_support_format_rar5.c in libarchive before 3.4.2 attempts to
75
	    unpack a RAR5 file with an invalid or corrupted header (such as a header
76
	    size of zero), leading to a SIGSEGV or possibly unspecified other impact.
77
	  </p>
78
	</blockquote>
79
      </body>
80
    </description>
81
    <references>
82
      <cvename>CVE-2020-9308</cvename>
83
      <url>https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20459</url>
84
      <url>https://github.com/libarchive/libarchive/pull/1326</url>
85
      <url>https://github.com/libarchive/libarchive/pull/1326/commits/94821008d6eea81e315c5881cdf739202961040a</url>
86
    </references>
87
    <dates>
88
      <discovery>2020-02-20</discovery>
89
      <entry>2020-02-27</entry>
90
    </dates>
91
  </vuln>
92
61
  <vuln vid="f0683976-5779-11ea-8a77-1c872ccb1e42">
93
  <vuln vid="f0683976-5779-11ea-8a77-1c872ccb1e42">
62
    <topic>LPE and RCE in OpenSMTPD's default install</topic>
94
    <topic>LPE and RCE in OpenSMTPD's default install</topic>
63
    <affects>
95
    <affects>

Return to bug 244474