CVE Vulnerabilities

CVE-2016-5418

Published: Sep 21, 2016 | Modified: Apr 12, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
4.6 IMPORTANT
AV:N/AC:H/Au:S/C:P/I:P/A:P
RedHat/V3
7.5 IMPORTANT
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.

Affected Software

NameVendorStart VersionEnd Version
Enterprise_linux_desktopRedhat6.0 (including)6.0 (including)
Enterprise_linux_hpc_nodeRedhat6.0 (including)6.0 (including)
Enterprise_linux_serverRedhat6.0 (including)6.0 (including)
Enterprise_linux_workstationRedhat6.0 (including)6.0 (including)
Red Hat Enterprise Linux 6RedHatlibarchive-0:2.8.3-7.el6_8*
Red Hat Enterprise Linux 7RedHatlibarchive-0:3.1.2-10.el7_2*
Red Hat OpenShift Container Platform 3.2RedHatatomic-openshift-0:3.2.1.15-1.git.0.d84be7f.el7*
Red Hat OpenShift Container Platform 3.2RedHatheapster-0:1.1.0-1.beta2.el7.1*
Red Hat OpenShift Container Platform 3.2RedHatopenshift-ansible-0:3.2.28-1.git.0.5a85fc5.el7*
Red Hat OpenShift Enterprise 3.1RedHatatomic-openshift-0:3.1.1.7-1.git.0.65f396b.el7aos*
LibarchiveUbuntuesm-infra-legacy/trusty*
LibarchiveUbuntuesm-infra/xenial*
LibarchiveUbuntuprecise*
LibarchiveUbuntutrusty*
LibarchiveUbuntutrusty/esm*
LibarchiveUbuntuupstream*
LibarchiveUbuntuxenial*
LibarchiveUbuntuyakkety*

References