{"id":"MGASA-2017-0056","summary":"Updated libarchive packages fix security vulnerability","details":"An error in the lha_read_file_header_1() function\n(archive_read_support_format_lha.c) in libarchive 3.2.2 allows remote\nattackers to trigger an out-of-bounds read memory access and subsequently\ncause a crash via a specially crafted archive. (CVE-2017-5601)\n","modified":"2026-02-04T02:39:22.458347Z","published":"2017-02-20T13:00:19Z","related":["CVE-2017-5601"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0056.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=20223"},{"type":"REPORT","url":"https://lwn.net/Alerts/713127/"},{"type":"REPORT","url":"https://security-tracker.debian.org/tracker/CVE-2017-5601"}],"affected":[{"package":{"name":"libarchive","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/libarchive?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.2-1.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0056.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}