Revision Date: | 2016-11-25 | Version: | 1 |
Title: | Security update for libarchive (Moderate) |
Description: |
This update for libarchive fixes several issues.
These security issues were fixed:
- CVE-2016-8687: Buffer overflow when printing a filename (bsc#1005070). - CVE-2016-8689: Heap overflow when reading corrupted 7Zip files (bsc#1005072). - CVE-2016-8688: Use after free because of incorrect calculation in next_line (bsc#1005076). - CVE-2016-5844: Integer overflow in the ISO parser in libarchive allowed remote attackers to cause a denial of service (application crash) via a crafted ISO file (bsc#986566). - CVE-2016-6250: Integer overflow in the ISO9660 writer in libarchive allowed remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow (bsc#989980). - CVE-2016-5418: The sandboxing code in libarchive mishandled hardlink archive entries of non-zero data size, which might allowed remote attackers to write to arbitrary files via a crafted archive file (bsc#998677).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1005070 1005072 1005076 986566 989980 998677 CVE-2015-2304 CVE-2016-5418 CVE-2016-5844 CVE-2016-6250 CVE-2016-8687 CVE-2016-8688 CVE-2016-8689 SUSE-SU-2016:2911-1
|
Platform(s): | SUSE Linux Enterprise Desktop 12 SP2
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP2 is installed AND libarchive13-3.1.2-25.1 is installed
|