Gentoo Logo

libarchive: Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 201406-02 / libarchive
Release Date June 01, 2014
Latest Revision June 01, 2014: 1
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
app-arch/libarchive < 3.1.2-r1 >= 3.1.2-r1 All supported architectures

Related bugreports: #366687, #463632


Multiple vulnerabilities have been found in libarchive, some of which may allow execution of arbitrary code.

2.  Impact Information


libarchive is a library for manipulating different streaming archive formats, including certain tar variants, several cpio formats, and both BSD and GNU ar variants.


Multiple vulnerabilities have been discovered in libarchive. Please review the CVE identifiers referenced below for details.


A remote attacker could entice a user or automated process to open a specially crafted archive using an application linked against libarchive, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

3.  Resolution Information


There is no known workaround at this time.


All libarchive users should upgrade to the latest version:

Code Listing 3.1: Resolution

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-arch/libarchive-3.1.2-r1"

Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying some of these packages.

4.  References


Page updated June 01, 2014

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.