From mboxrd@z Thu Jan 1 00:00:00 1970 From: ludo@gnu.org (Ludovic =?utf-8?Q?Court=C3=A8s?=) Subject: Re: [PATCH 0/1] libarchive: Fix CVE-2016-1541 Date: Wed, 11 May 2016 15:44:59 +0200 Message-ID: <87r3d8wvxg.fsf@gnu.org> References: Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:59793) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1b0URn-0005YV-0V for guix-devel@gnu.org; Wed, 11 May 2016 09:45:08 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1b0URj-0004Wo-KJ for guix-devel@gnu.org; Wed, 11 May 2016 09:45:06 -0400 In-Reply-To: (Leo Famulari's message of "Tue, 10 May 2016 16:29:08 -0400") List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-devel-bounces+gcggd-guix-devel=m.gmane.org@gnu.org Sender: "Guix-devel" To: Leo Famulari Cc: guix-devel@gnu.org Leo Famulari skribis: > There is a buffer overflow in libarchive, CVE-2016-1541 [0]. According > to MITRE description, it "allows remote attackers to execute arbitrary > code via crafted entry-size values in a ZIP archive." > > Yikes! > > This patch applies the upstream patch [1]. > > Requesting your review, since soooo many packages depend on libarchive. LGTM. > I will follow this commit with an "ungrafting" commit on core-updates. Cool! Thank you! Ludo=E2=80=99.