openSUSE Security Update : libarchive (openSUSE-2016-969)

high Nessus Plugin ID 92975

Synopsis

The remote openSUSE host is missing a security update.

Description

libarchive was updated to fix 20 security issues.

These security issues were fixed :

- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).

- CVE-2015-8919: Heap out of bounds read in LHA/LZH parser (bsc#985697).

- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).

- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).

- CVE-2015-8922: NULL pointer access in 7z parser (bsc#985685).

- CVE-2015-8923: Unclear crashes in ZIP parser (bsc#985703).

- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).

- CVE-2015-8925: Unclear invalid memory read in mtree parser (bsc#985706).

- CVE-2015-8926: NULL pointer access in RAR parser (bsc#985704).

- CVE-2015-8928: Heap out of bounds read in mtree parser (bsc#985679).

- CVE-2015-8929: Memory leak in tar parser (bsc#985669).

- CVE-2015-8930: Endless loop in ISO parser (bsc#985700).

- CVE-2015-8931: Undefined behavior / signed integer overflow in mtree parser (bsc#985689).

- CVE-2015-8932: Compress handler left shifting larger than int size (bsc#985665).

- CVE-2015-8933: Undefined behavior / signed integer overflow in TAR parser (bsc#985688).

- CVE-2015-8934: Out of bounds read in RAR (bsc#985673).

- CVE-2016-4300: Heap buffer overflow vulnerability in the 7zip read_SubStreamsInfo (bsc#985832).

- CVE-2016-4301: Stack-based buffer overflow in the mtree parse_device (bsc#985826).

- CVE-2016-4302: Heap buffer overflow in the Rar decompression functionality (bsc#985835).

- CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990).

This update was imported from the SUSE:SLE-12:Update update project.

Solution

Update the affected libarchive packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=984990

https://bugzilla.opensuse.org/show_bug.cgi?id=985609

https://bugzilla.opensuse.org/show_bug.cgi?id=985665

https://bugzilla.opensuse.org/show_bug.cgi?id=985669

https://bugzilla.opensuse.org/show_bug.cgi?id=985673

https://bugzilla.opensuse.org/show_bug.cgi?id=985675

https://bugzilla.opensuse.org/show_bug.cgi?id=985679

https://bugzilla.opensuse.org/show_bug.cgi?id=985682

https://bugzilla.opensuse.org/show_bug.cgi?id=985685

https://bugzilla.opensuse.org/show_bug.cgi?id=985688

https://bugzilla.opensuse.org/show_bug.cgi?id=985689

https://bugzilla.opensuse.org/show_bug.cgi?id=985697

https://bugzilla.opensuse.org/show_bug.cgi?id=985698

https://bugzilla.opensuse.org/show_bug.cgi?id=985700

https://bugzilla.opensuse.org/show_bug.cgi?id=985703

https://bugzilla.opensuse.org/show_bug.cgi?id=985704

https://bugzilla.opensuse.org/show_bug.cgi?id=985706

https://bugzilla.opensuse.org/show_bug.cgi?id=985826

https://bugzilla.opensuse.org/show_bug.cgi?id=985832

https://bugzilla.opensuse.org/show_bug.cgi?id=985835

Plugin Details

Severity: High

ID: 92975

File Name: openSUSE-2016-969.nasl

Version: 2.5

Type: local

Agent: unix

Published: 8/16/2016

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libarchive13-32bit, p-cpe:/a:novell:opensuse:libarchive13-debuginfo, p-cpe:/a:novell:opensuse:libarchive-debugsource, cpe:/o:novell:opensuse:42.1, p-cpe:/a:novell:opensuse:libarchive-devel, p-cpe:/a:novell:opensuse:bsdtar, p-cpe:/a:novell:opensuse:bsdtar-debuginfo, p-cpe:/a:novell:opensuse:libarchive13, p-cpe:/a:novell:opensuse:libarchive13-debuginfo-32bit

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 8/11/2016

Reference Information

CVE: CVE-2015-8918, CVE-2015-8919, CVE-2015-8920, CVE-2015-8921, CVE-2015-8922, CVE-2015-8923, CVE-2015-8924, CVE-2015-8925, CVE-2015-8926, CVE-2015-8928, CVE-2015-8929, CVE-2015-8930, CVE-2015-8931, CVE-2015-8932, CVE-2015-8933, CVE-2015-8934, CVE-2016-4300, CVE-2016-4301, CVE-2016-4302, CVE-2016-4809