Source: libarchive
Version: 3.8.5-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/libarchive/libarchive/issues/2904
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for libarchive.

CVE-2026-5745[0]:
| A flaw was found in libarchive. A NULL pointer dereference
| vulnerability exists in the ACL parsing logic, specifically within
| the archive_acl_from_text_nl() function. When processing a malformed
| ACL string (such as a bare "d" or "default" tag without subsequent
| fields), the function fails to perform adequate validation before
| advancing the pointer. An attacker can exploit this by providing a
| maliciously crafted archive, causing an application utilizing the
| libarchive API (such as bsdtar) to crash, resulting in a Denial of
| Service (DoS).


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-5745
    https://www.cve.org/CVERecord?id=CVE-2026-5745
[1] https://github.com/libarchive/libarchive/issues/2904

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to