
Cloud Vulnerability DB
A community-led vulnerabilities database
Libarchive version 3.6.0 was discovered to contain an out-of-bounds read vulnerability in the component zipxlzmaalone_init. The vulnerability was identified in February 2022 and affects the libarchive library, which is used for handling various streaming archive formats including tar, cpio, ar variants, shar archives, ISO9660 CDROM images, and ZIP archives (CVE Mitre, Debian Tracker).
The vulnerability manifests as an out-of-bounds read condition in the zipxlzmaalone_init component. The issue was introduced in libarchive v3.4.0 through commit 121035c83e18b70d3128e9ac966109ebedb7e516 and was subsequently fixed in version 3.6.1 via commit cfaa28168a07ea4a53276b63068f94fce37d6aff (Debian Tracker).
The vulnerability allows an attacker who can supply a specially crafted zip file to libarchive to trigger an out-of-bounds read condition (Red Hat Portal).
Multiple distributions have released patches to address this vulnerability. Fedora released version 3.5.3-2.fc36, Debian updated to version 3.4.3-2+deb11u2 for bullseye, and Gentoo recommended upgrading to version 3.6.1 or later. Users are advised to upgrade to the fixed versions available through their respective package managers (Fedora Update, Gentoo Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."