openSUSE Security Update : libarchive (openSUSE-2016-969)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

libarchive was updated to fix 20 security issues.

These security issues were fixed :

- CVE-2015-8918: Overlapping memcpy in CAB parser
(bsc#985698).

- CVE-2015-8919: Heap out of bounds read in LHA/LZH parser
(bsc#985697).

- CVE-2015-8920: Stack out of bounds read in ar parser
(bsc#985675).

- CVE-2015-8921: Global out of bounds read in mtree parser
(bsc#985682).

- CVE-2015-8922: NULL pointer access in 7z parser
(bsc#985685).

- CVE-2015-8923: Unclear crashes in ZIP parser
(bsc#985703).

- CVE-2015-8924: Heap buffer read overflow in tar
(bsc#985609).

- CVE-2015-8925: Unclear invalid memory read in mtree
parser (bsc#985706).

- CVE-2015-8926: NULL pointer access in RAR parser
(bsc#985704).

- CVE-2015-8928: Heap out of bounds read in mtree parser
(bsc#985679).

- CVE-2015-8929: Memory leak in tar parser (bsc#985669).

- CVE-2015-8930: Endless loop in ISO parser (bsc#985700).

- CVE-2015-8931: Undefined behavior / signed integer
overflow in mtree parser (bsc#985689).

- CVE-2015-8932: Compress handler left shifting larger
than int size (bsc#985665).

- CVE-2015-8933: Undefined behavior / signed integer
overflow in TAR parser (bsc#985688).

- CVE-2015-8934: Out of bounds read in RAR (bsc#985673).

- CVE-2016-4300: Heap buffer overflow vulnerability in the
7zip read_SubStreamsInfo (bsc#985832).

- CVE-2016-4301: Stack-based buffer overflow in the mtree
parse_device (bsc#985826).

- CVE-2016-4302: Heap buffer overflow in the Rar
decompression functionality (bsc#985835).

- CVE-2016-4809: Memory allocate error with symbolic links
in cpio archives (bsc#984990).

This update was imported from the SUSE:SLE-12:Update update project.

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=984990
https://bugzilla.opensuse.org/show_bug.cgi?id=985609
https://bugzilla.opensuse.org/show_bug.cgi?id=985665
https://bugzilla.opensuse.org/show_bug.cgi?id=985669
https://bugzilla.opensuse.org/show_bug.cgi?id=985673
https://bugzilla.opensuse.org/show_bug.cgi?id=985675
https://bugzilla.opensuse.org/show_bug.cgi?id=985679
https://bugzilla.opensuse.org/show_bug.cgi?id=985682
https://bugzilla.opensuse.org/show_bug.cgi?id=985685
https://bugzilla.opensuse.org/show_bug.cgi?id=985688
https://bugzilla.opensuse.org/show_bug.cgi?id=985689
https://bugzilla.opensuse.org/show_bug.cgi?id=985697
https://bugzilla.opensuse.org/show_bug.cgi?id=985698
https://bugzilla.opensuse.org/show_bug.cgi?id=985700
https://bugzilla.opensuse.org/show_bug.cgi?id=985703
https://bugzilla.opensuse.org/show_bug.cgi?id=985704
https://bugzilla.opensuse.org/show_bug.cgi?id=985706
https://bugzilla.opensuse.org/show_bug.cgi?id=985826
https://bugzilla.opensuse.org/show_bug.cgi?id=985832
https://bugzilla.opensuse.org/show_bug.cgi?id=985835

Solution :

Update the affected libarchive packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now