You are here
Home > Preporuke > Ranjivost programske biblioteke libarchive

Ranjivost programske biblioteke libarchive

==========================================================================
Ubuntu Security Notice USN-2549-1
March 25, 2015

libarchive vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

libarchive could be made to crash or overwrite files.

Software Description:
– libarchive: Library to read/write archive files

Details:

It was discovered that the libarchive bsdcpio utility extracted absolute
paths by default without using the –insecure flag, contrary to
expectations. If a user or automated system were tricked into extracting
cpio archives containing absolute paths, a remote attacker may be able to
write to arbitrary files. (CVE-2015-2304)

Fabian Yamaguchi discovered that libarchive incorrectly handled certain
type conversions. A remote attacker could possibly use this issue to cause
libarchive to crash, resulting in a denial of service. This issue only
affected Ubuntu 12.04 LTS. (CVE-2013-0211)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
bsdcpio 3.1.2-9ubuntu0.1
libarchive13 3.1.2-9ubuntu0.1

Ubuntu 14.04 LTS:
bsdcpio 3.1.2-7ubuntu2.1
libarchive13 3.1.2-7ubuntu2.1

Ubuntu 12.04 LTS:
bsdcpio 3.0.3-6ubuntu1.1
libarchive12 3.0.3-6ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2549-1
CVE-2013-0211, CVE-2015-2304

Package Information:
https://launchpad.net/ubuntu/+source/libarchive/3.1.2-9ubuntu0.1
https://launchpad.net/ubuntu/+source/libarchive/3.1.2-7ubuntu2.1
https://launchpad.net/ubuntu/+source/libarchive/3.0.3-6ubuntu1.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=inKV
—–END PGP SIGNATURE—–

Top
More in Preporuke
Ranjivost programskog paketa batik

Otkrivena je XXE (XML external entity) ranjivost u programskom paketu batik za Ubuntu 12.04 LTS, 14.04 LTS i 14.10. Udaljeni...

Close