The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.
http://rhn.redhat.com/errata/RHSA-2016-1844.html
http://rhn.redhat.com/errata/RHSA-2016-1850.html
http://www.openwall.com/lists/oss-security/2016/08/09/2
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/93165
https://access.redhat.com/errata/RHSA-2016:1852
https://access.redhat.com/errata/RHSA-2016:1853
https://bugzilla.redhat.com/show_bug.cgi?id=1362601
https://gist.github.com/anonymous/e48209b03f1dd9625a992717e7b89c4f
https://github.com/libarchive/libarchive/commit/dfd6b54ce33960e420fb206d8872fb759b577ad9
Source: MITRE
Published: 2016-09-21
Updated: 2019-12-27
Type: CWE-19
Base Score: 5
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact Score: 2.9
Exploitability Score: 10
Severity: MEDIUM
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Impact Score: 3.6
Exploitability Score: 3.9
Severity: HIGH