{"id":"MGASA-2022-0060","summary":"Updated libarchive packages fix security vulnerability","details":"Processing fixup entries may follow symbolic links. (CVE-2021-31566)\n\nlibarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called\nfrom do_uncompress_block and process_block). (CVE-2021-36976)\n","modified":"2026-02-04T04:12:16.458242Z","published":"2022-02-12T17:31:35Z","related":["CVE-2021-31566","CVE-2021-36976"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0060.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=30023"},{"type":"REPORT","url":"https://github.com/libarchive/libarchive/releases/tag/v3.5.3"}],"affected":[{"package":{"name":"libarchive","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/libarchive?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.5.3-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0060.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}