SUSE-SU-2016:1939-1: important: Security update for bsdtar
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Aug 2 09:08:48 MDT 2016
SUSE Security Update: Security update for bsdtar
______________________________________________________________________________
Announcement ID: SUSE-SU-2016:1939-1
Rating: important
References: #920870 #984990 #985609 #985669 #985675 #985682
#985698
Cross-References: CVE-2015-2304 CVE-2015-8918 CVE-2015-8920
CVE-2015-8921 CVE-2015-8924 CVE-2015-8929
CVE-2016-4809
Affected Products:
SUSE Studio Onsite 1.3
SUSE OpenStack Cloud 5
SUSE Manager Proxy 2.1
SUSE Manager 2.1
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3-LTSS
SUSE Linux Enterprise Server 11-SP2-LTSS
SUSE Linux Enterprise Point of Sale 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available.
Description:
bsdtar was updated to fix seven security issues.
These security issues were fixed:
- CVE-2015-8929: Memory leak in tar parser (bsc#985669).
- CVE-2016-4809: Memory allocate error with symbolic links in cpio
archives (bsc#984990).
- CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).
- CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).
- CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).
- CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).
- CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly
when '..' is rejected (bsc#920870).
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Studio Onsite 1.3:
zypper in -t patch slestso13-bsdtar-12672=1
- SUSE OpenStack Cloud 5:
zypper in -t patch sleclo50sp3-bsdtar-12672=1
- SUSE Manager Proxy 2.1:
zypper in -t patch slemap21-bsdtar-12672=1
- SUSE Manager 2.1:
zypper in -t patch sleman21-bsdtar-12672=1
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-bsdtar-12672=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-bsdtar-12672=1
- SUSE Linux Enterprise Server 11-SP3-LTSS:
zypper in -t patch slessp3-bsdtar-12672=1
- SUSE Linux Enterprise Server 11-SP2-LTSS:
zypper in -t patch slessp2-bsdtar-12672=1
- SUSE Linux Enterprise Point of Sale 11-SP3:
zypper in -t patch sleposp3-bsdtar-12672=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-bsdtar-12672=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Studio Onsite 1.3 (x86_64):
libarchive-devel-2.5.5-9.1
- SUSE OpenStack Cloud 5 (x86_64):
libarchive2-2.5.5-9.1
- SUSE Manager Proxy 2.1 (x86_64):
libarchive2-2.5.5-9.1
- SUSE Manager 2.1 (s390x x86_64):
libarchive2-2.5.5-9.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):
libarchive-devel-2.5.5-9.1
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
libarchive2-2.5.5-9.1
- SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):
libarchive2-2.5.5-9.1
- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):
libarchive2-2.5.5-9.1
- SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
libarchive2-2.5.5-9.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
bsdtar-debuginfo-2.5.5-9.1
bsdtar-debugsource-2.5.5-9.1
References:
https://www.suse.com/security/cve/CVE-2015-2304.html
https://www.suse.com/security/cve/CVE-2015-8918.html
https://www.suse.com/security/cve/CVE-2015-8920.html
https://www.suse.com/security/cve/CVE-2015-8921.html
https://www.suse.com/security/cve/CVE-2015-8924.html
https://www.suse.com/security/cve/CVE-2015-8929.html
https://www.suse.com/security/cve/CVE-2016-4809.html
https://bugzilla.suse.com/920870
https://bugzilla.suse.com/984990
https://bugzilla.suse.com/985609
https://bugzilla.suse.com/985669
https://bugzilla.suse.com/985675
https://bugzilla.suse.com/985682
https://bugzilla.suse.com/985698
More information about the sle-security-updates
mailing list