A flaw was found in libarchive. A NULL pointer dereference vulnerability exists in the ACL parsing logic, specifically within the archive_acl_from_text_nl() function. When processing a malformed ACL string (such as a bare "d" or "default" tag without subsequent fields), the function fails to perform adequate validation before advancing the pointer. An attacker can exploit this by providing a maliciously crafted archive, causing an application utilizing the libarchive API (such as bsdtar) to crash, resulting in a Denial of Service (DoS).
| Vendor | Product | Versions |
|---|---|---|
| red hat | red hat enterprise linux | — |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| open source | open source libarchive | cert_advisory | 90% |
Updated description with new details, changed severity to HIGH, and noted that the exploit is not available but the vulnerability is actively exploited.
Initial creation