Bug 1222911 (CVE-2024-26256) - VUL-0: CVE-2024-26256: libarchive: remote code execution vulnerability
Summary: VUL-0: CVE-2024-26256: libarchive: remote code execution vulnerability
Status: NEW
Alias: CVE-2024-26256
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Antonio Teixeira
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/400972/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-26256:7.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-04-16 16:58 UTC by SMASH SMASH
Modified: 2024-06-28 15:19 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Camila Camargo de Matos 2024-04-16 17:02:05 UTC
There is currently very little information about this issue. More investigation/information is necessary before affected codestreams can be defined.
Comment 3 Camila Camargo de Matos 2024-04-23 13:46:26 UTC
It was confirmed by upstream that this issue affects https://github.com/libarchive/libarchive.

The issue has been fixed through the following PR and commit:
https://github.com/libarchive/libarchive/pull/2135
https://github.com/libarchive/libarchive/commit/eb7939b24a681a04648a59cdebd386b1e9dc9237
Comment 5 Camila Camargo de Matos 2024-04-23 13:52:25 UTC
Libarchive packages that contain the software at a version earlier than 3.6.0 seem to not be affected by this issue, as the vulnerable function, 'execute_filter_e8', was only introduced in version 3.6.0 together with the RAR filter support functionality. See [0] and [1] for more information.

[0] https://github.com/libarchive/libarchive/pull/1503
[1] https://github.com/libarchive/libarchive/commit/01a2d329d