Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-2304 (GCVE-0-2015-2304)
Vulnerability from cvelistv5
Published
2015-03-15 19:00
Modified
2024-08-06 05:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:10:16.381Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1035996", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035996" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2015-0106.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526" }, { "name": "openSUSE-SU-2015:0568", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/libarchive/libarchive/pull/110" }, { "name": "FreeBSD-SA-16:22", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc" }, { "name": "[oss-security] 20150116 CVE Request: libarchive -- directory traversal in bsdcpio", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/16/7" }, { "name": "DSA-3180", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3180" }, { "name": "USN-2549-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2549-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J" }, { "name": "GLSA-201701-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-03" }, { "name": "MDVSA-2015:157", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:157" }, { "name": "[oss-security] 20150108 Directory traversals in cpio and friends?", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/07/5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1035996", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035996" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2015-0106.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526" }, { "name": "openSUSE-SU-2015:0568", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/libarchive/libarchive/pull/110" }, { "name": "FreeBSD-SA-16:22", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc" }, { "name": "[oss-security] 20150116 CVE Request: libarchive -- directory traversal in bsdcpio", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/16/7" }, { "name": "DSA-3180", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3180" }, { "name": "USN-2549-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2549-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J" }, { "name": "GLSA-201701-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-03" }, { "name": "MDVSA-2015:157", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:157" }, { "name": "[oss-security] 20150108 Directory traversals in cpio and friends?", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/07/5" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2304", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1035996", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035996" }, { "name": "http://advisories.mageia.org/MGASA-2015-0106.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0106.html" }, { "name": "https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526", "refsource": "CONFIRM", "url": "https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526" }, { "name": "openSUSE-SU-2015:0568", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html" }, { "name": "https://github.com/libarchive/libarchive/pull/110", "refsource": "CONFIRM", "url": "https://github.com/libarchive/libarchive/pull/110" }, { "name": "FreeBSD-SA-16:22", "refsource": "FREEBSD", "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc" }, { "name": "[oss-security] 20150116 CVE Request: libarchive -- directory traversal in bsdcpio", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/16/7" }, { "name": "DSA-3180", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3180" }, { "name": "USN-2549-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2549-1" }, { "name": "https://groups.google.com/forum/#!msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J", "refsource": "CONFIRM", "url": "https://groups.google.com/forum/#!msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J" }, { "name": "GLSA-201701-03", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-03" }, { "name": "MDVSA-2015:157", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:157" }, { "name": "[oss-security] 20150108 Directory traversals in cpio and friends?", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/07/5" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2304", "datePublished": "2015-03-15T19:00:00", "dateReserved": "2015-03-15T00:00:00", "dateUpdated": "2024-08-06T05:10:16.381Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-2304\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-03-15T19:59:00.070\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de recorrido de directorio absoluto en bsdcpio en libarchive 3.1.2 y anteriores permite a atacantes remotos escribir archivos arbitrarios a trav\u00e9s de un nombre completo de ruta en un archivo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:P\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:x64:*:*\",\"versionEndIncluding\":\"3.1.2\",\"matchCriteriaId\":\"58595970-A83C-4FD0-B505-837B653ADF31\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A63F39-30BE-443F-AF10-6245587D3359\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03117DF1-3BEC-4B8D-AD63-DBBDB2126081\"}]}]}],\"references\":[{\"url\":\"http://advisories.mageia.org/MGASA-2015-0106.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3180\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:157\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/01/07/5\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/01/16/7\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1035996\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2549-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/libarchive/libarchive/pull/110\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://groups.google.com/forum/#%21msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201701-03\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://advisories.mageia.org/MGASA-2015-0106.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3180\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:157\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/01/07/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/01/16/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1035996\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2549-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/libarchive/libarchive/pull/110\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://groups.google.com/forum/#%21msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201701-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
suse-su-2016:1939-1
Vulnerability from csaf_suse
Published
2016-08-02 11:41
Modified
2016-08-02 11:41
Summary
Security update for bsdtar
Notes
Title of the patch
Security update for bsdtar
Description of the patch
bsdtar was updated to fix seven security issues.
These security issues were fixed:
- CVE-2015-8929: Memory leak in tar parser (bsc#985669).
- CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990).
- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).
- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).
- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).
- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).
- CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly when '..' is rejected (bsc#920870).
Patchnames
sdksp4-bsdtar-12672,sleclo50sp3-bsdtar-12672,sleman21-bsdtar-12672,slemap21-bsdtar-12672,sleposp3-bsdtar-12672,slessp2-bsdtar-12672,slessp3-bsdtar-12672,slessp4-bsdtar-12672,slestso13-bsdtar-12672
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for bsdtar", "title": "Title of the patch" }, { "category": "description", "text": "bsdtar was updated to fix seven security issues.\n\nThese security issues were fixed:\n- CVE-2015-8929: Memory leak in tar parser (bsc#985669).\n- CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990).\n- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).\n- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).\n- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).\n- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).\n- CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly when \u0027..\u0027 is rejected (bsc#920870).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-bsdtar-12672,sleclo50sp3-bsdtar-12672,sleman21-bsdtar-12672,slemap21-bsdtar-12672,sleposp3-bsdtar-12672,slessp2-bsdtar-12672,slessp3-bsdtar-12672,slessp4-bsdtar-12672,slestso13-bsdtar-12672", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1939-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1939-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161939-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1939-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002172.html" }, { "category": "self", "summary": "SUSE Bug 920870", "url": "https://bugzilla.suse.com/920870" }, { "category": "self", "summary": "SUSE Bug 984990", "url": "https://bugzilla.suse.com/984990" }, { "category": "self", "summary": "SUSE Bug 985609", "url": "https://bugzilla.suse.com/985609" }, { "category": "self", "summary": "SUSE Bug 985669", "url": "https://bugzilla.suse.com/985669" }, { "category": "self", "summary": "SUSE Bug 985675", "url": "https://bugzilla.suse.com/985675" }, { "category": "self", "summary": "SUSE Bug 985682", "url": "https://bugzilla.suse.com/985682" }, { "category": "self", "summary": "SUSE Bug 985698", "url": "https://bugzilla.suse.com/985698" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2304 page", "url": "https://www.suse.com/security/cve/CVE-2015-2304/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8918 page", "url": "https://www.suse.com/security/cve/CVE-2015-8918/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8920 page", "url": "https://www.suse.com/security/cve/CVE-2015-8920/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8921 page", "url": "https://www.suse.com/security/cve/CVE-2015-8921/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8924 page", "url": "https://www.suse.com/security/cve/CVE-2015-8924/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8929 page", "url": "https://www.suse.com/security/cve/CVE-2015-8929/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4809 page", "url": "https://www.suse.com/security/cve/CVE-2016-4809/" } ], "title": "Security update for bsdtar", "tracking": { "current_release_date": "2016-08-02T11:41:26Z", "generator": { "date": "2016-08-02T11:41:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1939-1", "initial_release_date": "2016-08-02T11:41:26Z", "revision_history": [ { "date": "2016-08-02T11:41:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libarchive-devel-2.5.5-9.1.i586", "product": { "name": "libarchive-devel-2.5.5-9.1.i586", "product_id": "libarchive-devel-2.5.5-9.1.i586" } }, { "category": "product_version", "name": "libarchive2-2.5.5-9.1.i586", "product": { "name": "libarchive2-2.5.5-9.1.i586", "product_id": "libarchive2-2.5.5-9.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libarchive-devel-2.5.5-9.1.ia64", "product": { "name": "libarchive-devel-2.5.5-9.1.ia64", "product_id": "libarchive-devel-2.5.5-9.1.ia64" } }, { "category": "product_version", "name": "libarchive2-2.5.5-9.1.ia64", "product": { "name": "libarchive2-2.5.5-9.1.ia64", "product_id": "libarchive2-2.5.5-9.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libarchive-devel-2.5.5-9.1.ppc64", "product": { "name": "libarchive-devel-2.5.5-9.1.ppc64", "product_id": "libarchive-devel-2.5.5-9.1.ppc64" } }, { "category": "product_version", "name": "libarchive2-2.5.5-9.1.ppc64", "product": { "name": "libarchive2-2.5.5-9.1.ppc64", "product_id": "libarchive2-2.5.5-9.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libarchive-devel-2.5.5-9.1.s390x", "product": { "name": "libarchive-devel-2.5.5-9.1.s390x", "product_id": "libarchive-devel-2.5.5-9.1.s390x" } }, { "category": "product_version", "name": "libarchive2-2.5.5-9.1.s390x", "product": { "name": "libarchive2-2.5.5-9.1.s390x", "product_id": "libarchive2-2.5.5-9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libarchive-devel-2.5.5-9.1.x86_64", "product": { "name": "libarchive-devel-2.5.5-9.1.x86_64", "product_id": "libarchive-devel-2.5.5-9.1.x86_64" } }, { "category": "product_version", "name": "libarchive2-2.5.5-9.1.x86_64", "product": { "name": "libarchive2-2.5.5-9.1.x86_64", "product_id": "libarchive2-2.5.5-9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 5", "product": { "name": "SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5", "product_identification_helper": { "cpe": "cpe:/o:suse:cloud:5" } } }, { "category": "product_name", "name": "SUSE Manager 2.1", "product": { "name": "SUSE Manager 2.1", "product_id": "SUSE Manager 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:2.1" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 2.1", "product": { "name": "SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:2.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } }, { "category": "product_name", "name": "SUSE Studio Onsite 1.3", "product": { "name": "SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-studioonsite:1.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-2.5.5-9.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586" }, "product_reference": "libarchive-devel-2.5.5-9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-2.5.5-9.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64" }, "product_reference": "libarchive-devel-2.5.5-9.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-2.5.5-9.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64" }, "product_reference": "libarchive-devel-2.5.5-9.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-2.5.5-9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x" }, "product_reference": "libarchive-devel-2.5.5-9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-2.5.5-9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64" }, "product_reference": "libarchive-devel-2.5.5-9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64" }, "product_reference": "libarchive2-2.5.5-9.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x" }, "product_reference": "libarchive2-2.5.5-9.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64" }, "product_reference": "libarchive2-2.5.5-9.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64" }, "product_reference": "libarchive2-2.5.5-9.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586" }, "product_reference": "libarchive2-2.5.5-9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586" }, "product_reference": "libarchive2-2.5.5-9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x" }, "product_reference": "libarchive2-2.5.5-9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64" }, "product_reference": "libarchive2-2.5.5-9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586" }, "product_reference": "libarchive2-2.5.5-9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x" }, "product_reference": "libarchive2-2.5.5-9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64" }, "product_reference": "libarchive2-2.5.5-9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586" }, "product_reference": "libarchive2-2.5.5-9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x" }, "product_reference": "libarchive2-2.5.5-9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64" }, "product_reference": "libarchive2-2.5.5-9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586" }, "product_reference": "libarchive2-2.5.5-9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64" }, "product_reference": "libarchive2-2.5.5-9.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64" }, "product_reference": "libarchive2-2.5.5-9.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x" }, "product_reference": "libarchive2-2.5.5-9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64" }, "product_reference": "libarchive2-2.5.5-9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586" }, "product_reference": "libarchive2-2.5.5-9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64" }, "product_reference": "libarchive2-2.5.5-9.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64" }, "product_reference": "libarchive2-2.5.5-9.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x" }, "product_reference": "libarchive2-2.5.5-9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive2-2.5.5-9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64" }, "product_reference": "libarchive2-2.5.5-9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-2.5.5-9.1.x86_64 as component of SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" }, "product_reference": "libarchive-devel-2.5.5-9.1.x86_64", "relates_to_product_reference": "SUSE Studio Onsite 1.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2304", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2304" } ], "notes": [ { "category": "general", "text": "Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2304", "url": "https://www.suse.com/security/cve/CVE-2015-2304" }, { "category": "external", "summary": "SUSE Bug 920870 for CVE-2015-2304", "url": "https://bugzilla.suse.com/920870" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:41:26Z", "details": "moderate" } ], "title": "CVE-2015-2304" }, { "cve": "CVE-2015-8918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8918" } ], "notes": [ { "category": "general", "text": "The archive_string_append function in archive_string.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted cab files, related to \"overlapping memcpy.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8918", "url": "https://www.suse.com/security/cve/CVE-2015-8918" }, { "category": "external", "summary": "SUSE Bug 985698 for CVE-2015-8918", "url": "https://bugzilla.suse.com/985698" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:41:26Z", "details": "moderate" } ], "title": "CVE-2015-8918" }, { "cve": "CVE-2015-8920", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8920" } ], "notes": [ { "category": "general", "text": "The _ar_read_header function in archive_read_support_format_ar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds stack read) via a crafted ar file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8920", "url": "https://www.suse.com/security/cve/CVE-2015-8920" }, { "category": "external", "summary": "SUSE Bug 985675 for CVE-2015-8920", "url": "https://bugzilla.suse.com/985675" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:41:26Z", "details": "moderate" } ], "title": "CVE-2015-8920" }, { "cve": "CVE-2015-8921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8921" } ], "notes": [ { "category": "general", "text": "The ae_strtofflags function in archive_entry.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mtree file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8921", "url": "https://www.suse.com/security/cve/CVE-2015-8921" }, { "category": "external", "summary": "SUSE Bug 985682 for CVE-2015-8921", "url": "https://bugzilla.suse.com/985682" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:41:26Z", "details": "moderate" } ], "title": "CVE-2015-8921" }, { "cve": "CVE-2015-8924", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8924" } ], "notes": [ { "category": "general", "text": "The archive_read_format_tar_read_header function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tar file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8924", "url": "https://www.suse.com/security/cve/CVE-2015-8924" }, { "category": "external", "summary": "SUSE Bug 985609 for CVE-2015-8924", "url": "https://bugzilla.suse.com/985609" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:41:26Z", "details": "moderate" } ], "title": "CVE-2015-8924" }, { "cve": "CVE-2015-8929", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8929" } ], "notes": [ { "category": "general", "text": "Memory leak in the __archive_read_get_extract function in archive_read_extract2.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service via a tar file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8929", "url": "https://www.suse.com/security/cve/CVE-2015-8929" }, { "category": "external", "summary": "SUSE Bug 985669 for CVE-2015-8929", "url": "https://bugzilla.suse.com/985669" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:41:26Z", "details": "moderate" } ], "title": "CVE-2015-8929" }, { "cve": "CVE-2016-4809", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4809" } ], "notes": [ { "category": "general", "text": "The archive_read_format_cpio_read_header function in archive_read_support_format_cpio.c in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a CPIO archive with a large symlink.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4809", "url": "https://www.suse.com/security/cve/CVE-2016-4809" }, { "category": "external", "summary": "SUSE Bug 984990 for CVE-2016-4809", "url": "https://bugzilla.suse.com/984990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libarchive2-2.5.5-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libarchive-devel-2.5.5-9.1.x86_64", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.s390x", "SUSE Manager 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE Manager Proxy 2.1:libarchive2-2.5.5-9.1.x86_64", "SUSE OpenStack Cloud 5:libarchive2-2.5.5-9.1.x86_64", "SUSE Studio Onsite 1.3:libarchive-devel-2.5.5-9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:41:26Z", "details": "low" } ], "title": "CVE-2016-4809" } ] }
suse-su-2016:2911-1
Vulnerability from csaf_suse
Published
2016-11-25 11:33
Modified
2016-11-25 11:33
Summary
Security update for libarchive
Notes
Title of the patch
Security update for libarchive
Description of the patch
This update for libarchive fixes several issues.
These security issues were fixed:
- CVE-2016-8687: Buffer overflow when printing a filename (bsc#1005070).
- CVE-2016-8689: Heap overflow when reading corrupted 7Zip files (bsc#1005072).
- CVE-2016-8688: Use after free because of incorrect calculation in next_line (bsc#1005076).
- CVE-2016-5844: Integer overflow in the ISO parser in libarchive allowed remote attackers to cause a denial of service (application crash) via a crafted ISO file (bsc#986566).
- CVE-2016-6250: Integer overflow in the ISO9660 writer in libarchive allowed remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow (bsc#989980).
- CVE-2016-5418: The sandboxing code in libarchive mishandled hardlink archive entries of non-zero data size, which might allowed remote attackers to write to arbitrary files via a crafted archive file (bsc#998677).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1698,SUSE-SLE-DESKTOP-12-SP2-2016-1698,SUSE-SLE-RPI-12-SP2-2016-1698,SUSE-SLE-SDK-12-SP1-2016-1698,SUSE-SLE-SDK-12-SP2-2016-1698,SUSE-SLE-SERVER-12-SP1-2016-1698,SUSE-SLE-SERVER-12-SP2-2016-1698
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for libarchive", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for libarchive fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2016-8687: Buffer overflow when printing a filename (bsc#1005070).\n- CVE-2016-8689: Heap overflow when reading corrupted 7Zip files (bsc#1005072).\n- CVE-2016-8688: Use after free because of incorrect calculation in next_line (bsc#1005076).\n- CVE-2016-5844: Integer overflow in the ISO parser in libarchive allowed remote attackers to cause a denial of service (application crash) via a crafted ISO file (bsc#986566).\n- CVE-2016-6250: Integer overflow in the ISO9660 writer in libarchive allowed remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow (bsc#989980).\n- CVE-2016-5418: The sandboxing code in libarchive mishandled hardlink archive entries of non-zero data size, which might allowed remote attackers to write to arbitrary files via a crafted archive file (bsc#998677).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-1698,SUSE-SLE-DESKTOP-12-SP2-2016-1698,SUSE-SLE-RPI-12-SP2-2016-1698,SUSE-SLE-SDK-12-SP1-2016-1698,SUSE-SLE-SDK-12-SP2-2016-1698,SUSE-SLE-SERVER-12-SP1-2016-1698,SUSE-SLE-SERVER-12-SP2-2016-1698", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2911-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2911-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162911-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2911-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" }, { "category": "self", "summary": "SUSE Bug 1005070", "url": "https://bugzilla.suse.com/1005070" }, { "category": "self", "summary": "SUSE Bug 1005072", "url": "https://bugzilla.suse.com/1005072" }, { "category": "self", "summary": "SUSE Bug 1005076", "url": "https://bugzilla.suse.com/1005076" }, { "category": "self", "summary": "SUSE Bug 986566", "url": "https://bugzilla.suse.com/986566" }, { "category": "self", "summary": "SUSE Bug 989980", "url": "https://bugzilla.suse.com/989980" }, { "category": "self", "summary": "SUSE Bug 998677", "url": "https://bugzilla.suse.com/998677" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2304 page", "url": "https://www.suse.com/security/cve/CVE-2015-2304/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5418 page", "url": "https://www.suse.com/security/cve/CVE-2016-5418/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5844 page", "url": "https://www.suse.com/security/cve/CVE-2016-5844/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6250 page", "url": "https://www.suse.com/security/cve/CVE-2016-6250/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8687 page", "url": "https://www.suse.com/security/cve/CVE-2016-8687/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8688 page", "url": "https://www.suse.com/security/cve/CVE-2016-8688/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8689 page", "url": "https://www.suse.com/security/cve/CVE-2016-8689/" } ], "title": "Security update for libarchive", "tracking": { "current_release_date": "2016-11-25T11:33:02Z", "generator": { "date": "2016-11-25T11:33:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2911-1", "initial_release_date": "2016-11-25T11:33:02Z", "revision_history": [ { "date": "2016-11-25T11:33:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libarchive13-3.1.2-25.1.aarch64", "product": { "name": "libarchive13-3.1.2-25.1.aarch64", "product_id": "libarchive13-3.1.2-25.1.aarch64" } }, { "category": "product_version", "name": "libarchive-devel-3.1.2-25.1.aarch64", "product": { "name": "libarchive-devel-3.1.2-25.1.aarch64", "product_id": "libarchive-devel-3.1.2-25.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libarchive-devel-3.1.2-25.1.ppc64le", "product": { "name": "libarchive-devel-3.1.2-25.1.ppc64le", "product_id": "libarchive-devel-3.1.2-25.1.ppc64le" } }, { "category": "product_version", "name": "libarchive13-3.1.2-25.1.ppc64le", "product": { "name": "libarchive13-3.1.2-25.1.ppc64le", "product_id": "libarchive13-3.1.2-25.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libarchive-devel-3.1.2-25.1.s390x", "product": { "name": "libarchive-devel-3.1.2-25.1.s390x", "product_id": "libarchive-devel-3.1.2-25.1.s390x" } }, { "category": "product_version", "name": "libarchive13-3.1.2-25.1.s390x", "product": { "name": "libarchive13-3.1.2-25.1.s390x", "product_id": "libarchive13-3.1.2-25.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libarchive13-3.1.2-25.1.x86_64", "product": { "name": "libarchive13-3.1.2-25.1.x86_64", "product_id": "libarchive13-3.1.2-25.1.x86_64" } }, { "category": "product_version", "name": "libarchive-devel-3.1.2-25.1.x86_64", "product": { "name": "libarchive-devel-3.1.2-25.1.x86_64", "product_id": "libarchive-devel-3.1.2-25.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP2", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2", "product": { "name": "SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64" }, "product_reference": "libarchive13-3.1.2-25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64" }, "product_reference": "libarchive13-3.1.2-25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64" }, "product_reference": "libarchive13-3.1.2-25.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-3.1.2-25.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le" }, "product_reference": "libarchive-devel-3.1.2-25.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-3.1.2-25.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x" }, "product_reference": "libarchive-devel-3.1.2-25.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-3.1.2-25.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64" }, "product_reference": "libarchive-devel-3.1.2-25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-3.1.2-25.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64" }, "product_reference": "libarchive-devel-3.1.2-25.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-3.1.2-25.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le" }, "product_reference": "libarchive-devel-3.1.2-25.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-3.1.2-25.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x" }, "product_reference": "libarchive-devel-3.1.2-25.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-3.1.2-25.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" }, "product_reference": "libarchive-devel-3.1.2-25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le" }, "product_reference": "libarchive13-3.1.2-25.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x" }, "product_reference": "libarchive13-3.1.2-25.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64" }, "product_reference": "libarchive13-3.1.2-25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le" }, "product_reference": "libarchive13-3.1.2-25.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x" }, "product_reference": "libarchive13-3.1.2-25.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64" }, "product_reference": "libarchive13-3.1.2-25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64" }, "product_reference": "libarchive13-3.1.2-25.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le" }, "product_reference": "libarchive13-3.1.2-25.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x" }, "product_reference": "libarchive13-3.1.2-25.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64" }, "product_reference": "libarchive13-3.1.2-25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64" }, "product_reference": "libarchive13-3.1.2-25.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le" }, "product_reference": "libarchive13-3.1.2-25.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x" }, "product_reference": "libarchive13-3.1.2-25.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64" }, "product_reference": "libarchive13-3.1.2-25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-2304", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2304" } ], "notes": [ { "category": "general", "text": "Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2304", "url": "https://www.suse.com/security/cve/CVE-2015-2304" }, { "category": "external", "summary": "SUSE Bug 920870 for CVE-2015-2304", "url": "https://bugzilla.suse.com/920870" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T11:33:02Z", "details": "moderate" } ], "title": "CVE-2015-2304" }, { "cve": "CVE-2016-5418", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5418" } ], "notes": [ { "category": "general", "text": "The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5418", "url": "https://www.suse.com/security/cve/CVE-2016-5418" }, { "category": "external", "summary": "SUSE Bug 998677 for CVE-2016-5418", "url": "https://bugzilla.suse.com/998677" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T11:33:02Z", "details": "moderate" } ], "title": "CVE-2016-5418" }, { "cve": "CVE-2016-5844", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5844" } ], "notes": [ { "category": "general", "text": "Integer overflow in the ISO parser in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a crafted ISO file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5844", "url": "https://www.suse.com/security/cve/CVE-2016-5844" }, { "category": "external", "summary": "SUSE Bug 986566 for CVE-2016-5844", "url": "https://bugzilla.suse.com/986566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T11:33:02Z", "details": "moderate" } ], "title": "CVE-2016-5844" }, { "cve": "CVE-2016-6250", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6250" } ], "notes": [ { "category": "general", "text": "Integer overflow in the ISO9660 writer in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6250", "url": "https://www.suse.com/security/cve/CVE-2016-6250" }, { "category": "external", "summary": "SUSE Bug 989980 for CVE-2016-6250", "url": "https://bugzilla.suse.com/989980" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T11:33:02Z", "details": "low" } ], "title": "CVE-2016-6250" }, { "cve": "CVE-2016-8687", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8687" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8687", "url": "https://www.suse.com/security/cve/CVE-2016-8687" }, { "category": "external", "summary": "SUSE Bug 1005070 for CVE-2016-8687", "url": "https://bugzilla.suse.com/1005070" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T11:33:02Z", "details": "low" } ], "title": "CVE-2016-8687" }, { "cve": "CVE-2016-8688", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8688" } ], "notes": [ { "category": "general", "text": "The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8688", "url": "https://www.suse.com/security/cve/CVE-2016-8688" }, { "category": "external", "summary": "SUSE Bug 1005076 for CVE-2016-8688", "url": "https://bugzilla.suse.com/1005076" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T11:33:02Z", "details": "moderate" } ], "title": "CVE-2016-8688" }, { "cve": "CVE-2016-8689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8689" } ], "notes": [ { "category": "general", "text": "The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8689", "url": "https://www.suse.com/security/cve/CVE-2016-8689" }, { "category": "external", "summary": "SUSE Bug 1005072 for CVE-2016-8689", "url": "https://bugzilla.suse.com/1005072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libarchive13-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libarchive-devel-3.1.2-25.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libarchive-devel-3.1.2-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T11:33:02Z", "details": "moderate" } ], "title": "CVE-2016-8689" } ] }
suse-su-2015:0667-1
Vulnerability from csaf_suse
Published
2015-03-16 08:39
Modified
2015-03-16 08:39
Summary
Security update for libarchive
Notes
Title of the patch
Security update for libarchive
Description of the patch
libarchive was updated to fix a directory traversal in the bsdcpio tool, which
allowed attackers supplying crafted archives to overwrite files. (CVE-2015-2304)
Also, a integer overflow was fixed that could also overflow buffers. (CVE-2013-0211)
Patchnames
SUSE-SLE-DESKTOP-12-2015-155,SUSE-SLE-SDK-12-2015-155,SUSE-SLE-SERVER-12-2015-155
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for libarchive", "title": "Title of the patch" }, { "category": "description", "text": "\nlibarchive was updated to fix a directory traversal in the bsdcpio tool, which\nallowed attackers supplying crafted archives to overwrite files. (CVE-2015-2304)\n\nAlso, a integer overflow was fixed that could also overflow buffers. (CVE-2013-0211)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2015-155,SUSE-SLE-SDK-12-2015-155,SUSE-SLE-SERVER-12-2015-155", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0667-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0667-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150667-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0667-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-April/001328.html" }, { "category": "self", "summary": "SUSE Bug 800024", "url": "https://bugzilla.suse.com/800024" }, { "category": "self", "summary": "SUSE Bug 920870", "url": "https://bugzilla.suse.com/920870" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0211 page", "url": "https://www.suse.com/security/cve/CVE-2013-0211/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2304 page", "url": "https://www.suse.com/security/cve/CVE-2015-2304/" } ], "title": "Security update for libarchive", "tracking": { "current_release_date": "2015-03-16T08:39:18Z", "generator": { "date": "2015-03-16T08:39:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0667-1", "initial_release_date": "2015-03-16T08:39:18Z", "revision_history": [ { "date": "2015-03-16T08:39:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libarchive-devel-3.1.2-9.1.ppc64le", "product": { "name": "libarchive-devel-3.1.2-9.1.ppc64le", "product_id": "libarchive-devel-3.1.2-9.1.ppc64le" } }, { "category": "product_version", "name": "libarchive13-3.1.2-9.1.ppc64le", "product": { "name": "libarchive13-3.1.2-9.1.ppc64le", "product_id": "libarchive13-3.1.2-9.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libarchive-devel-3.1.2-9.1.s390x", "product": { "name": "libarchive-devel-3.1.2-9.1.s390x", "product_id": "libarchive-devel-3.1.2-9.1.s390x" } }, { "category": "product_version", "name": "libarchive13-3.1.2-9.1.s390x", "product": { "name": "libarchive13-3.1.2-9.1.s390x", "product_id": "libarchive13-3.1.2-9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libarchive13-3.1.2-9.1.x86_64", "product": { "name": "libarchive13-3.1.2-9.1.x86_64", "product_id": "libarchive13-3.1.2-9.1.x86_64" } }, { "category": "product_version", "name": "libarchive-devel-3.1.2-9.1.x86_64", "product": { "name": "libarchive-devel-3.1.2-9.1.x86_64", "product_id": "libarchive-devel-3.1.2-9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-9.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:libarchive13-3.1.2-9.1.x86_64" }, "product_reference": "libarchive13-3.1.2-9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-3.1.2-9.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.ppc64le" }, "product_reference": "libarchive-devel-3.1.2-9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-3.1.2-9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.s390x" }, "product_reference": "libarchive-devel-3.1.2-9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-3.1.2-9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.x86_64" }, "product_reference": "libarchive-devel-3.1.2-9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-9.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.ppc64le" }, "product_reference": "libarchive13-3.1.2-9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-9.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.s390x" }, "product_reference": "libarchive13-3.1.2-9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-9.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.x86_64" }, "product_reference": "libarchive13-3.1.2-9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.ppc64le" }, "product_reference": "libarchive13-3.1.2-9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.s390x" }, "product_reference": "libarchive13-3.1.2-9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.1.2-9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.x86_64" }, "product_reference": "libarchive13-3.1.2-9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-0211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0211" } ], "notes": [ { "category": "general", "text": "Integer signedness error in the archive_write_zip_data function in archive_write_set_format_zip.c in libarchive 3.1.2 and earlier, when running on 64-bit machines, allows context-dependent attackers to cause a denial of service (crash) via unspecified vectors, which triggers an improper conversion between unsigned and signed types, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:libarchive13-3.1.2-9.1.x86_64", "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.ppc64le", "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.s390x", "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0211", "url": "https://www.suse.com/security/cve/CVE-2013-0211" }, { "category": "external", "summary": "SUSE Bug 800024 for CVE-2013-0211", "url": "https://bugzilla.suse.com/800024" }, { "category": "external", "summary": "SUSE Bug 979005 for CVE-2013-0211", "url": "https://bugzilla.suse.com/979005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:libarchive13-3.1.2-9.1.x86_64", "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.ppc64le", "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.s390x", "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-03-16T08:39:18Z", "details": "moderate" } ], "title": "CVE-2013-0211" }, { "cve": "CVE-2015-2304", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2304" } ], "notes": [ { "category": "general", "text": "Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:libarchive13-3.1.2-9.1.x86_64", "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.ppc64le", "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.s390x", "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2304", "url": "https://www.suse.com/security/cve/CVE-2015-2304" }, { "category": "external", "summary": "SUSE Bug 920870 for CVE-2015-2304", "url": "https://bugzilla.suse.com/920870" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:libarchive13-3.1.2-9.1.x86_64", "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.ppc64le", "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.s390x", "SUSE Linux Enterprise Server 12:libarchive13-3.1.2-9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:libarchive13-3.1.2-9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12:libarchive-devel-3.1.2-9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-03-16T08:39:18Z", "details": "moderate" } ], "title": "CVE-2015-2304" } ] }
fkie_cve-2015-2304
Vulnerability from fkie_nvd
Published
2015-03-15 19:59
Modified
2025-04-12 10:46
Severity ?
Summary
Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://advisories.mageia.org/MGASA-2015-0106.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html | ||
cve@mitre.org | http://www.debian.org/security/2015/dsa-3180 | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2015:157 | ||
cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/01/07/5 | Exploit | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2015/01/16/7 | ||
cve@mitre.org | http://www.securitytracker.com/id/1035996 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2549-1 | ||
cve@mitre.org | https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526 | ||
cve@mitre.org | https://github.com/libarchive/libarchive/pull/110 | ||
cve@mitre.org | https://groups.google.com/forum/#%21msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J | ||
cve@mitre.org | https://security.gentoo.org/glsa/201701-03 | ||
cve@mitre.org | https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc | ||
af854a3a-2127-422b-91ae-364da2661108 | http://advisories.mageia.org/MGASA-2015-0106.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3180 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:157 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/01/07/5 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/01/16/7 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1035996 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2549-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/libarchive/libarchive/pull/110 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/#%21msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201701-03 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libarchive | libarchive | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
opensuse | opensuse | 13.1 | |
opensuse | opensuse | 13.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:x64:*:*", "matchCriteriaId": "58595970-A83C-4FD0-B505-837B653ADF31", "versionEndIncluding": "3.1.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive." }, { "lang": "es", "value": "Vulnerabilidad de recorrido de directorio absoluto en bsdcpio en libarchive 3.1.2 y anteriores permite a atacantes remotos escribir archivos arbitrarios a trav\u00e9s de un nombre completo de ruta en un archivo." } ], "id": "CVE-2015-2304", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-03-15T19:59:00.070", "references": [ { "source": "cve@mitre.org", "url": "http://advisories.mageia.org/MGASA-2015-0106.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3180" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:157" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/07/5" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2015/01/16/7" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1035996" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2549-1" }, { "source": "cve@mitre.org", "url": "https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526" }, { "source": "cve@mitre.org", "url": "https://github.com/libarchive/libarchive/pull/110" }, { "source": "cve@mitre.org", "url": "https://groups.google.com/forum/#%21msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201701-03" }, { "source": "cve@mitre.org", "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2015-0106.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/07/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/01/16/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2549-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/libarchive/libarchive/pull/110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201701-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
opensuse-su-2024:10127-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
bsdtar-3.2.2-2.1 on GA media
Notes
Title of the patch
bsdtar-3.2.2-2.1 on GA media
Description of the patch
These are all security issues fixed in the bsdtar-3.2.2-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10127
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "bsdtar-3.2.2-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the bsdtar-3.2.2-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10127", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10127-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0211 page", "url": "https://www.suse.com/security/cve/CVE-2013-0211/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2304 page", "url": "https://www.suse.com/security/cve/CVE-2015-2304/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8917 page", "url": "https://www.suse.com/security/cve/CVE-2015-8917/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8928 page", "url": "https://www.suse.com/security/cve/CVE-2015-8928/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8933 page", "url": "https://www.suse.com/security/cve/CVE-2015-8933/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8934 page", "url": "https://www.suse.com/security/cve/CVE-2015-8934/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1541 page", "url": "https://www.suse.com/security/cve/CVE-2016-1541/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4300 page", "url": "https://www.suse.com/security/cve/CVE-2016-4300/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4301 page", "url": "https://www.suse.com/security/cve/CVE-2016-4301/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4809 page", "url": "https://www.suse.com/security/cve/CVE-2016-4809/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5418 page", "url": "https://www.suse.com/security/cve/CVE-2016-5418/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5844 page", "url": "https://www.suse.com/security/cve/CVE-2016-5844/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6250 page", "url": "https://www.suse.com/security/cve/CVE-2016-6250/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8687 page", "url": "https://www.suse.com/security/cve/CVE-2016-8687/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8688 page", "url": "https://www.suse.com/security/cve/CVE-2016-8688/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8689 page", "url": "https://www.suse.com/security/cve/CVE-2016-8689/" } ], "title": "bsdtar-3.2.2-2.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10127-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "bsdtar-3.2.2-2.1.aarch64", "product": { "name": "bsdtar-3.2.2-2.1.aarch64", "product_id": "bsdtar-3.2.2-2.1.aarch64" } }, { "category": "product_version", "name": "libarchive-devel-3.2.2-2.1.aarch64", "product": { "name": "libarchive-devel-3.2.2-2.1.aarch64", "product_id": "libarchive-devel-3.2.2-2.1.aarch64" } }, { "category": "product_version", "name": "libarchive13-3.2.2-2.1.aarch64", "product": { "name": "libarchive13-3.2.2-2.1.aarch64", "product_id": "libarchive13-3.2.2-2.1.aarch64" } }, { "category": "product_version", "name": "libarchive13-32bit-3.2.2-2.1.aarch64", "product": { "name": "libarchive13-32bit-3.2.2-2.1.aarch64", "product_id": "libarchive13-32bit-3.2.2-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bsdtar-3.2.2-2.1.ppc64le", "product": { "name": "bsdtar-3.2.2-2.1.ppc64le", "product_id": "bsdtar-3.2.2-2.1.ppc64le" } }, { "category": "product_version", "name": "libarchive-devel-3.2.2-2.1.ppc64le", "product": { "name": "libarchive-devel-3.2.2-2.1.ppc64le", "product_id": "libarchive-devel-3.2.2-2.1.ppc64le" } }, { "category": "product_version", "name": "libarchive13-3.2.2-2.1.ppc64le", "product": { "name": "libarchive13-3.2.2-2.1.ppc64le", "product_id": "libarchive13-3.2.2-2.1.ppc64le" } }, { "category": "product_version", "name": "libarchive13-32bit-3.2.2-2.1.ppc64le", "product": { "name": "libarchive13-32bit-3.2.2-2.1.ppc64le", "product_id": "libarchive13-32bit-3.2.2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bsdtar-3.2.2-2.1.s390x", "product": { "name": "bsdtar-3.2.2-2.1.s390x", "product_id": "bsdtar-3.2.2-2.1.s390x" } }, { "category": "product_version", "name": "libarchive-devel-3.2.2-2.1.s390x", "product": { "name": "libarchive-devel-3.2.2-2.1.s390x", "product_id": "libarchive-devel-3.2.2-2.1.s390x" } }, { "category": "product_version", "name": "libarchive13-3.2.2-2.1.s390x", "product": { "name": "libarchive13-3.2.2-2.1.s390x", "product_id": "libarchive13-3.2.2-2.1.s390x" } }, { "category": "product_version", "name": "libarchive13-32bit-3.2.2-2.1.s390x", "product": { "name": "libarchive13-32bit-3.2.2-2.1.s390x", "product_id": "libarchive13-32bit-3.2.2-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bsdtar-3.2.2-2.1.x86_64", "product": { "name": "bsdtar-3.2.2-2.1.x86_64", "product_id": "bsdtar-3.2.2-2.1.x86_64" } }, { "category": "product_version", "name": "libarchive-devel-3.2.2-2.1.x86_64", "product": { "name": "libarchive-devel-3.2.2-2.1.x86_64", "product_id": "libarchive-devel-3.2.2-2.1.x86_64" } }, { "category": "product_version", "name": "libarchive13-3.2.2-2.1.x86_64", "product": { "name": "libarchive13-3.2.2-2.1.x86_64", "product_id": "libarchive13-3.2.2-2.1.x86_64" } }, { "category": "product_version", "name": "libarchive13-32bit-3.2.2-2.1.x86_64", "product": { "name": "libarchive13-32bit-3.2.2-2.1.x86_64", "product_id": "libarchive13-32bit-3.2.2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bsdtar-3.2.2-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64" }, "product_reference": "bsdtar-3.2.2-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "bsdtar-3.2.2-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le" }, "product_reference": "bsdtar-3.2.2-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "bsdtar-3.2.2-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x" }, "product_reference": "bsdtar-3.2.2-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "bsdtar-3.2.2-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64" }, "product_reference": "bsdtar-3.2.2-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-3.2.2-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64" }, "product_reference": "libarchive-devel-3.2.2-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-3.2.2-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le" }, "product_reference": "libarchive-devel-3.2.2-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-3.2.2-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x" }, "product_reference": "libarchive-devel-3.2.2-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive-devel-3.2.2-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64" }, "product_reference": "libarchive-devel-3.2.2-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.2.2-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64" }, "product_reference": "libarchive13-3.2.2-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.2.2-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le" }, "product_reference": "libarchive13-3.2.2-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.2.2-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x" }, "product_reference": "libarchive13-3.2.2-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-3.2.2-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64" }, "product_reference": "libarchive13-3.2.2-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-32bit-3.2.2-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64" }, "product_reference": "libarchive13-32bit-3.2.2-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-32bit-3.2.2-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le" }, "product_reference": "libarchive13-32bit-3.2.2-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-32bit-3.2.2-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x" }, "product_reference": "libarchive13-32bit-3.2.2-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libarchive13-32bit-3.2.2-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" }, "product_reference": "libarchive13-32bit-3.2.2-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-0211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0211" } ], "notes": [ { "category": "general", "text": "Integer signedness error in the archive_write_zip_data function in archive_write_set_format_zip.c in libarchive 3.1.2 and earlier, when running on 64-bit machines, allows context-dependent attackers to cause a denial of service (crash) via unspecified vectors, which triggers an improper conversion between unsigned and signed types, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0211", "url": "https://www.suse.com/security/cve/CVE-2013-0211" }, { "category": "external", "summary": "SUSE Bug 800024 for CVE-2013-0211", "url": "https://bugzilla.suse.com/800024" }, { "category": "external", "summary": "SUSE Bug 979005 for CVE-2013-0211", "url": "https://bugzilla.suse.com/979005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0211" }, { "cve": "CVE-2015-2304", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2304" } ], "notes": [ { "category": "general", "text": "Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2304", "url": "https://www.suse.com/security/cve/CVE-2015-2304" }, { "category": "external", "summary": "SUSE Bug 920870 for CVE-2015-2304", "url": "https://bugzilla.suse.com/920870" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-2304" }, { "cve": "CVE-2015-8917", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8917" } ], "notes": [ { "category": "general", "text": "bsdtar in libarchive before 3.2.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an invalid character in the name of a cab file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8917", "url": "https://www.suse.com/security/cve/CVE-2015-8917" }, { "category": "external", "summary": "SUSE Bug 985691 for CVE-2015-8917", "url": "https://bugzilla.suse.com/985691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8917" }, { "cve": "CVE-2015-8928", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8928" } ], "notes": [ { "category": "general", "text": "The process_add_entry function in archive_read_support_format_mtree.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mtree file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8928", "url": "https://www.suse.com/security/cve/CVE-2015-8928" }, { "category": "external", "summary": "SUSE Bug 985679 for CVE-2015-8928", "url": "https://bugzilla.suse.com/985679" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8928" }, { "cve": "CVE-2015-8933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8933" } ], "notes": [ { "category": "general", "text": "Integer overflow in the archive_read_format_tar_skip function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8933", "url": "https://www.suse.com/security/cve/CVE-2015-8933" }, { "category": "external", "summary": "SUSE Bug 985688 for CVE-2015-8933", "url": "https://bugzilla.suse.com/985688" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8933" }, { "cve": "CVE-2015-8934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8934" } ], "notes": [ { "category": "general", "text": "The copy_from_lzss_window function in archive_read_support_format_rar.c in libarchive 3.2.0 and earlier allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted rar file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8934", "url": "https://www.suse.com/security/cve/CVE-2015-8934" }, { "category": "external", "summary": "SUSE Bug 985673 for CVE-2015-8934", "url": "https://bugzilla.suse.com/985673" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8934" }, { "cve": "CVE-2016-1541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1541" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1541", "url": "https://www.suse.com/security/cve/CVE-2016-1541" }, { "category": "external", "summary": "SUSE Bug 979005 for CVE-2016-1541", "url": "https://bugzilla.suse.com/979005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1541" }, { "cve": "CVE-2016-4300", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4300" } ], "notes": [ { "category": "general", "text": "Integer overflow in the read_SubStreamsInfo function in archive_read_support_format_7zip.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a 7zip file with a large number of substreams, which triggers a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4300", "url": "https://www.suse.com/security/cve/CVE-2016-4300" }, { "category": "external", "summary": "SUSE Bug 985832 for CVE-2016-4300", "url": "https://bugzilla.suse.com/985832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4300" }, { "cve": "CVE-2016-4301", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4301" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the parse_device function in archive_read_support_format_mtree.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a crafted mtree file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4301", "url": "https://www.suse.com/security/cve/CVE-2016-4301" }, { "category": "external", "summary": "SUSE Bug 985826 for CVE-2016-4301", "url": "https://bugzilla.suse.com/985826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4301" }, { "cve": "CVE-2016-4809", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4809" } ], "notes": [ { "category": "general", "text": "The archive_read_format_cpio_read_header function in archive_read_support_format_cpio.c in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a CPIO archive with a large symlink.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4809", "url": "https://www.suse.com/security/cve/CVE-2016-4809" }, { "category": "external", "summary": "SUSE Bug 984990 for CVE-2016-4809", "url": "https://bugzilla.suse.com/984990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4809" }, { "cve": "CVE-2016-5418", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5418" } ], "notes": [ { "category": "general", "text": "The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5418", "url": "https://www.suse.com/security/cve/CVE-2016-5418" }, { "category": "external", "summary": "SUSE Bug 998677 for CVE-2016-5418", "url": "https://bugzilla.suse.com/998677" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5418" }, { "cve": "CVE-2016-5844", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5844" } ], "notes": [ { "category": "general", "text": "Integer overflow in the ISO parser in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a crafted ISO file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5844", "url": "https://www.suse.com/security/cve/CVE-2016-5844" }, { "category": "external", "summary": "SUSE Bug 986566 for CVE-2016-5844", "url": "https://bugzilla.suse.com/986566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5844" }, { "cve": "CVE-2016-6250", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6250" } ], "notes": [ { "category": "general", "text": "Integer overflow in the ISO9660 writer in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6250", "url": "https://www.suse.com/security/cve/CVE-2016-6250" }, { "category": "external", "summary": "SUSE Bug 989980 for CVE-2016-6250", "url": "https://bugzilla.suse.com/989980" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-6250" }, { "cve": "CVE-2016-8687", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8687" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8687", "url": "https://www.suse.com/security/cve/CVE-2016-8687" }, { "category": "external", "summary": "SUSE Bug 1005070 for CVE-2016-8687", "url": "https://bugzilla.suse.com/1005070" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-8687" }, { "cve": "CVE-2016-8688", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8688" } ], "notes": [ { "category": "general", "text": "The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8688", "url": "https://www.suse.com/security/cve/CVE-2016-8688" }, { "category": "external", "summary": "SUSE Bug 1005076 for CVE-2016-8688", "url": "https://bugzilla.suse.com/1005076" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-8688" }, { "cve": "CVE-2016-8689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8689" } ], "notes": [ { "category": "general", "text": "The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8689", "url": "https://www.suse.com/security/cve/CVE-2016-8689" }, { "category": "external", "summary": "SUSE Bug 1005072 for CVE-2016-8689", "url": "https://bugzilla.suse.com/1005072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x", "openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x", "openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-8689" } ] }
ghsa-fg4c-3cxq-4rf3
Vulnerability from github
Published
2022-05-14 02:06
Modified
2025-04-12 12:46
VLAI Severity ?
Details
Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.
{ "affected": [], "aliases": [ "CVE-2015-2304" ], "database_specific": { "cwe_ids": [ "CWE-22" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-03-15T19:59:00Z", "severity": "MODERATE" }, "details": "Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.", "id": "GHSA-fg4c-3cxq-4rf3", "modified": "2025-04-12T12:46:11Z", "published": "2022-05-14T02:06:51Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-2304" }, { "type": "WEB", "url": "https://github.com/libarchive/libarchive/pull/110" }, { "type": "WEB", "url": "https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526" }, { "type": "WEB", "url": "https://groups.google.com/forum/#!msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J" }, { "type": "WEB", "url": "https://groups.google.com/forum/#%21msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201701-03" }, { "type": "WEB", "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc" }, { "type": "WEB", "url": "http://advisories.mageia.org/MGASA-2015-0106.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3180" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:157" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2015/01/07/5" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2015/01/16/7" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1035996" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2549-1" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2015-2304
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2015-2304", "description": "Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.", "id": "GSD-2015-2304", "references": [ "https://www.suse.com/security/cve/CVE-2015-2304.html", "https://www.debian.org/security/2015/dsa-3180", "https://ubuntu.com/security/CVE-2015-2304" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-2304" ], "details": "Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.", "id": "GSD-2015-2304", "modified": "2023-12-13T01:20:00.665890Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2304", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1035996", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035996" }, { "name": "http://advisories.mageia.org/MGASA-2015-0106.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2015-0106.html" }, { "name": "https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526", "refsource": "CONFIRM", "url": "https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526" }, { "name": "openSUSE-SU-2015:0568", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html" }, { "name": "https://github.com/libarchive/libarchive/pull/110", "refsource": "CONFIRM", "url": "https://github.com/libarchive/libarchive/pull/110" }, { "name": "FreeBSD-SA-16:22", "refsource": "FREEBSD", "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc" }, { "name": "[oss-security] 20150116 CVE Request: libarchive -- directory traversal in bsdcpio", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/16/7" }, { "name": "DSA-3180", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3180" }, { "name": "USN-2549-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2549-1" }, { "name": "https://groups.google.com/forum/#!msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J", "refsource": "CONFIRM", "url": "https://groups.google.com/forum/#!msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J" }, { "name": "GLSA-201701-03", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-03" }, { "name": "MDVSA-2015:157", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:157" }, { "name": "[oss-security] 20150108 Directory traversals in cpio and friends?", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/07/5" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:x64:*:*", "cpe_name": [], "versionEndIncluding": "3.1.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2304" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-22" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20150108 Directory traversals in cpio and friends?", "refsource": "MLIST", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/07/5" }, { "name": "https://github.com/libarchive/libarchive/pull/110", "refsource": "CONFIRM", "tags": [], "url": "https://github.com/libarchive/libarchive/pull/110" }, { "name": "https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526", "refsource": "CONFIRM", "tags": [], "url": "https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526" }, { "name": "DSA-3180", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2015/dsa-3180" }, { "name": "[oss-security] 20150116 CVE Request: libarchive -- directory traversal in bsdcpio", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2015/01/16/7" }, { "name": "openSUSE-SU-2015:0568", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html" }, { "name": "USN-2549-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2549-1" }, { "name": "http://advisories.mageia.org/MGASA-2015-0106.html", "refsource": "CONFIRM", "tags": [], "url": "http://advisories.mageia.org/MGASA-2015-0106.html" }, { "name": "MDVSA-2015:157", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:157" }, { "name": "FreeBSD-SA-16:22", "refsource": "FREEBSD", "tags": [], "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc" }, { "name": "1035996", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1035996" }, { "name": "GLSA-201701-03", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201701-03" }, { "name": "https://groups.google.com/forum/#!msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J", "refsource": "CONFIRM", "tags": [], "url": "https://groups.google.com/forum/#!msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-30T16:27Z", "publishedDate": "2015-03-15T19:59Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…