SUSE-SU-2016:1939-1: important: Security update for bsdtar

sle-updates at lists.suse.com sle-updates at lists.suse.com
Tue Aug 2 09:08:47 MDT 2016


   SUSE Security Update: Security update for bsdtar
______________________________________________________________________________

Announcement ID:    SUSE-SU-2016:1939-1
Rating:             important
References:         #920870 #984990 #985609 #985669 #985675 #985682 
                    #985698 
Cross-References:   CVE-2015-2304 CVE-2015-8918 CVE-2015-8920
                    CVE-2015-8921 CVE-2015-8924 CVE-2015-8929
                    CVE-2016-4809
Affected Products:
                    SUSE Studio Onsite 1.3
                    SUSE OpenStack Cloud 5
                    SUSE Manager Proxy 2.1
                    SUSE Manager 2.1
                    SUSE Linux Enterprise Software Development Kit 11-SP4
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Server 11-SP3-LTSS
                    SUSE Linux Enterprise Server 11-SP2-LTSS
                    SUSE Linux Enterprise Point of Sale 11-SP3
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

   An update that fixes 7 vulnerabilities is now available.

Description:

   bsdtar was updated to fix seven security issues.

   These security issues were fixed:
   - CVE-2015-8929: Memory leak in tar parser (bsc#985669).
   - CVE-2016-4809: Memory allocate error with symbolic links in cpio
     archives (bsc#984990).
   - CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675).
   - CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682).
   - CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609).
   - CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698).
   - CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly
     when '..' is rejected (bsc#920870).


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Studio Onsite 1.3:

      zypper in -t patch slestso13-bsdtar-12672=1

   - SUSE OpenStack Cloud 5:

      zypper in -t patch sleclo50sp3-bsdtar-12672=1

   - SUSE Manager Proxy 2.1:

      zypper in -t patch slemap21-bsdtar-12672=1

   - SUSE Manager 2.1:

      zypper in -t patch sleman21-bsdtar-12672=1

   - SUSE Linux Enterprise Software Development Kit 11-SP4:

      zypper in -t patch sdksp4-bsdtar-12672=1

   - SUSE Linux Enterprise Server 11-SP4:

      zypper in -t patch slessp4-bsdtar-12672=1

   - SUSE Linux Enterprise Server 11-SP3-LTSS:

      zypper in -t patch slessp3-bsdtar-12672=1

   - SUSE Linux Enterprise Server 11-SP2-LTSS:

      zypper in -t patch slessp2-bsdtar-12672=1

   - SUSE Linux Enterprise Point of Sale 11-SP3:

      zypper in -t patch sleposp3-bsdtar-12672=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-bsdtar-12672=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Studio Onsite 1.3 (x86_64):

      libarchive-devel-2.5.5-9.1

   - SUSE OpenStack Cloud 5 (x86_64):

      libarchive2-2.5.5-9.1

   - SUSE Manager Proxy 2.1 (x86_64):

      libarchive2-2.5.5-9.1

   - SUSE Manager 2.1 (s390x x86_64):

      libarchive2-2.5.5-9.1

   - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libarchive-devel-2.5.5-9.1

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      libarchive2-2.5.5-9.1

   - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):

      libarchive2-2.5.5-9.1

   - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):

      libarchive2-2.5.5-9.1

   - SUSE Linux Enterprise Point of Sale 11-SP3 (i586):

      libarchive2-2.5.5-9.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

      bsdtar-debuginfo-2.5.5-9.1
      bsdtar-debugsource-2.5.5-9.1


References:

   https://www.suse.com/security/cve/CVE-2015-2304.html
   https://www.suse.com/security/cve/CVE-2015-8918.html
   https://www.suse.com/security/cve/CVE-2015-8920.html
   https://www.suse.com/security/cve/CVE-2015-8921.html
   https://www.suse.com/security/cve/CVE-2015-8924.html
   https://www.suse.com/security/cve/CVE-2015-8929.html
   https://www.suse.com/security/cve/CVE-2016-4809.html
   https://bugzilla.suse.com/920870
   https://bugzilla.suse.com/984990
   https://bugzilla.suse.com/985609
   https://bugzilla.suse.com/985669
   https://bugzilla.suse.com/985675
   https://bugzilla.suse.com/985682
   https://bugzilla.suse.com/985698



More information about the sle-updates mailing list