Security update for libarchive
Announcement ID: | SUSE-SU-2018:3640-2 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves seven vulnerabilities can now be installed.
Description:
This update for libarchive fixes the following issues:
- CVE-2016-10209: The archive_wstring_append_from_mbs function in archive_string.c allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive file. (bsc#1032089)
- CVE-2016-10349: The archive_le32dec function in archive_endian.h allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. (bsc#1037008)
- CVE-2016-10350: The archive_read_format_cab_read_header function in archive_read_support_format_cab.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. (bsc#1037009)
- CVE-2017-14166: libarchive allowed remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c. (bsc#1057514)
- CVE-2017-14501: An out-of-bounds read flaw existed in parse_file_info in archive_read_support_format_iso9660.c when extracting a specially crafted iso9660 iso file, related to archive_read_format_iso9660_read_header. (bsc#1059139)
- CVE-2017-14502: read_header in archive_read_support_format_rar.c suffered from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header. (bsc#1059134)
- CVE-2017-14503: libarchive suffered from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16. (bsc#1059100)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Desktop 12 SP4
zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2018-2594=1
-
SUSE Linux Enterprise Software Development Kit 12 SP4
zypper in -t patch SUSE-SLE-SDK-12-SP4-2018-2594=1
-
SUSE Linux Enterprise High Performance Computing 12 SP4
zypper in -t patch SUSE-SLE-SERVER-12-SP4-2018-2594=1
-
SUSE Linux Enterprise Server 12 SP4
zypper in -t patch SUSE-SLE-SERVER-12-SP4-2018-2594=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4
zypper in -t patch SUSE-SLE-SERVER-12-SP4-2018-2594=1
Package List:
-
SUSE Linux Enterprise Desktop 12 SP4 (x86_64)
- libarchive13-debuginfo-3.1.2-26.3.1
- libarchive-debugsource-3.1.2-26.3.1
- libarchive13-3.1.2-26.3.1
-
SUSE Linux Enterprise Software Development Kit 12 SP4 (aarch64 ppc64le s390x x86_64)
- libarchive-debugsource-3.1.2-26.3.1
- libarchive-devel-3.1.2-26.3.1
-
SUSE Linux Enterprise High Performance Computing 12 SP4 (aarch64 x86_64)
- libarchive13-debuginfo-3.1.2-26.3.1
- libarchive-debugsource-3.1.2-26.3.1
- libarchive13-3.1.2-26.3.1
-
SUSE Linux Enterprise Server 12 SP4 (aarch64 ppc64le s390x x86_64)
- libarchive13-debuginfo-3.1.2-26.3.1
- libarchive-debugsource-3.1.2-26.3.1
- libarchive13-3.1.2-26.3.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (ppc64le x86_64)
- libarchive13-debuginfo-3.1.2-26.3.1
- libarchive-debugsource-3.1.2-26.3.1
- libarchive13-3.1.2-26.3.1
References:
- https://www.suse.com/security/cve/CVE-2016-10209.html
- https://www.suse.com/security/cve/CVE-2016-10349.html
- https://www.suse.com/security/cve/CVE-2016-10350.html
- https://www.suse.com/security/cve/CVE-2017-14166.html
- https://www.suse.com/security/cve/CVE-2017-14501.html
- https://www.suse.com/security/cve/CVE-2017-14502.html
- https://www.suse.com/security/cve/CVE-2017-14503.html
- https://bugzilla.suse.com/show_bug.cgi?id=1032089
- https://bugzilla.suse.com/show_bug.cgi?id=1037008
- https://bugzilla.suse.com/show_bug.cgi?id=1037009
- https://bugzilla.suse.com/show_bug.cgi?id=1057514
- https://bugzilla.suse.com/show_bug.cgi?id=1059100
- https://bugzilla.suse.com/show_bug.cgi?id=1059134
- https://bugzilla.suse.com/show_bug.cgi?id=1059139