[USN-3225-1] libarchive vulnerabilities

Marc Deslauriers marc.deslauriers at canonical.com
Thu Mar 9 18:52:56 UTC 2017


==========================================================================
Ubuntu Security Notice USN-3225-1
March 09, 2017

libarchive vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

libarchive could be made to crash, overwrite files, or run programs as your
login if it opened a specially crafted file.

Software Description:
- libarchive: Library to read/write archive files

Details:

It was discovered that libarchive incorrectly handled hardlink entries when
extracting archives. A remote attacker could possibly use this issue to
overwrite arbitrary files. (CVE-2016-5418)

Christian Wressnegger, Alwin Maier, and Fabian Yamaguchi discovered that
libarchive incorrectly handled filename lengths when writing ISO9660
archives. A remote attacker could use this issue to cause libarchive to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only applied to Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and
Ubuntu 16.04 LTS. (CVE-2016-6250)

Alexander Cherepanov discovered that libarchive incorrectly handled
recursive decompressions. A remote attacker could possibly use this issue
to cause libarchive to hang, resulting in a denial of service. This issue
only applied to Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.
(CVE-2016-7166)

It was discovered that libarchive incorrectly handled non-printable
multibyte characters in filenames. A remote attacker could possibly use
this issue to cause libarchive to crash, resulting in a denial of service.
(CVE-2016-8687)

It was discovered that libarchive incorrectly handled line sizes when
extracting certain archives. A remote attacker could possibly use this
issue to cause libarchive to crash, resulting in a denial of service.
(CVE-2016-8688)

It was discovered that libarchive incorrectly handled multiple EmptyStream
attributes when extracting certain 7zip archives. A remote attacker could
possibly use this issue to cause libarchive to crash, resulting in a denial
of service. (CVE-2016-8689)

Jakub Jirasek discovered that libarchive incorrectly handled memory when
extracting certain archives. A remote attacker could possibly use this
issue to cause libarchive to crash, resulting in a denial of service.
(CVE-2017-5601)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.10:
  libarchive13                    3.2.1-2ubuntu0.1

Ubuntu 16.04 LTS:
  libarchive13                    3.1.2-11ubuntu0.16.04.3

Ubuntu 14.04 LTS:
  libarchive13                    3.1.2-7ubuntu2.4

Ubuntu 12.04 LTS:
  libarchive12                    3.0.3-6ubuntu1.4

In general, a standard system update will make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-3225-1
  CVE-2016-5418, CVE-2016-6250, CVE-2016-7166, CVE-2016-8687,
  CVE-2016-8688, CVE-2016-8689, CVE-2017-5601

Package Information:
  https://launchpad.net/ubuntu/+source/libarchive/3.2.1-2ubuntu0.1
  https://launchpad.net/ubuntu/+source/libarchive/3.1.2-11ubuntu0.16.04.3
  https://launchpad.net/ubuntu/+source/libarchive/3.1.2-7ubuntu2.4
  https://launchpad.net/ubuntu/+source/libarchive/3.0.3-6ubuntu1.4


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20170309/fc4fabfc/attachment.sig>


More information about the ubuntu-security-announce mailing list