Your message dated Wed, 30 Mar 2022 09:34:28 -0400
with message-id 
<CAD+GYvw_sBecX8bWjDFPkg_eOpvAR2OCzcG0EHcRAqToK2Tf=a...@mail.gmail.com>
and subject line Re: libarchive: CVE-2021-36976
has caused the Debian Bug report #991442,
regarding libarchive: CVE-2021-36976
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
991442: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991442
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: libarchive
Version: 3.4.3-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for libarchive.

CVE-2021-36976[0]:
| libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string
| (called from do_uncompress_block and process_block).


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-36976
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976
[1] https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375
[2] 
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Version: 3.6.0-1

--- End Message ---

Reply via email to