SUSE-SU-2018:0862-1: moderate: Security update for unrar
    sle-updates at lists.suse.com 
    sle-updates at lists.suse.com
       
    Tue Apr  3 13:09:14 MDT 2018
    
    
  
   SUSE Security Update: Security update for unrar
______________________________________________________________________________
Announcement ID:    SUSE-SU-2018:0862-1
Rating:             moderate
References:         #1046882 #1054038 #513804 #693890 
Cross-References:   CVE-2012-6706 CVE-2017-12938 CVE-2017-12940
                    CVE-2017-12941 CVE-2017-12942
Affected Products:
                    SUSE Linux Enterprise Server 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
   An update that fixes 5 vulnerabilities is now available.
Description:
   This update for unrar to version 5.6.1 fixes several issues.
   These security issues were fixed:
   - CVE-2017-12938: Prevent remote attackers to bypass a directory-traversal
     protection mechanism via vectors involving a symlink to the . directory,
     a symlink to the .. directory, and a regular file (bsc#1054038).
   - CVE-2017-12940: Prevent out-of-bounds read in the EncodeFileName::Decode
     call within the Archive::ReadHeader15 function (bsc#1054038).
   - CVE-2017-12941: Prevent an out-of-bounds read in the Unpack::Unpack20
     function (bsc#1054038).
   - CVE-2017-12942: Prevent a buffer overflow in the Unpack::LongLZ function
     (bsc#1054038).
   These non-security issues were fixed:
   - Added extraction support for .LZ archives created by Lzip compressor
   - Enable unpacking of files in ZIP archives compressed with XZ algorithm
     and encrypted with AES
   - Added support for PAX extended headers inside of TAR archive
   - If RAR recovery volumes (.rev files) are present in the same folder as
     usual RAR volumes, archive test command verifies .rev contents after
     completing testing .rar files
   - By default unrar skips symbolic links with absolute paths in link target
     when extracting unless -ola command line switch is specified
   - Added support for AES-NI CPU instructions
   - Support for a new RAR 5.0 archiving format
   - Wildcard exclusion mask for folders
   - Added libunrar* and libunrar*-devel subpackages (bsc#513804)
   - Prevent conditional jumps depending on uninitialised values (bsc#1046882)
Patch Instructions:
   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".
   Alternatively you can run the command listed for your product:
   - SUSE Linux Enterprise Server 11-SP4:
      zypper in -t patch slessp4-unrar-13542=1
   - SUSE Linux Enterprise Debuginfo 11-SP4:
      zypper in -t patch dbgsp4-unrar-13542=1
Package List:
   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      unrar-5.6.1-5.3.1
   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
      unrar-debuginfo-5.6.1-5.3.1
      unrar-debugsource-5.6.1-5.3.1
References:
   https://www.suse.com/security/cve/CVE-2012-6706.html
   https://www.suse.com/security/cve/CVE-2017-12938.html
   https://www.suse.com/security/cve/CVE-2017-12940.html
   https://www.suse.com/security/cve/CVE-2017-12941.html
   https://www.suse.com/security/cve/CVE-2017-12942.html
   https://bugzilla.suse.com/1046882
   https://bugzilla.suse.com/1054038
   https://bugzilla.suse.com/513804
   https://bugzilla.suse.com/693890
    
    
More information about the sle-updates
mailing list