Operating System:

[Debian]

Published:

02 January 2019

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.0025
                        libarchive security update
                              2 January 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libarchive
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
Impact/Access:     Denial of Service -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-1000880 CVE-2018-1000878 CVE-2018-1000877
                   CVE-2017-14503 CVE-2017-14502 CVE-2017-14501
                   CVE-2017-14166 CVE-2016-10350 CVE-2016-10349
                   CVE-2016-10209  

Reference:         ESB-2019.0004
                   ESB-2018.3719

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4360

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4360-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 27, 2018                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : libarchive
CVE ID         : CVE-2016-10209 CVE-2016-10349   CVE-2016-10350
                 CVE-2017-14166 CVE-2017-14501   CVE-2017-14502
		 CVE-2017-14503 CVE-2018-1000877 CVE-2018-1000878
		 CVE-2018-1000880

Multiple security issues were found in libarchive, a multi-format archive
and compression library: Processing malformed RAR archives could result
in denial of service or the execution of arbitrary code and malformed
WARC, LHarc, ISO, Xar or CAB archives could result in denial of service.

For the stable distribution (stretch), these problems have been fixed in
version 3.2.2-2+deb9u1.

We recommend that you upgrade your libarchive packages.

For the detailed security status of libarchive please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libarchive

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlwlACEACgkQEMKTtsN8
TjY7+g//eXZq5+GQ2wBEfImcVBROSQFe/QjQLHcW/fC+u/VQj7UssAfeCBmGIX1e
CBU4WvC59cU4FiYdNw2ezyas3Daqtnb4qwKTh6DYWGmDNOdI6Ppd6cyJauRDMspn
xLVlN6pvA1K7gWaejV385dYDMUBpBbV44OBhiZHhXh3tYbDxXhmGXToL+9lEWs28
G+c0dPGVo4TvyxAKEpWxzPJnRUy8ZEnk6f/vc9wwJP95gOYGuqkSdDfaVDFJvL4/
epQ+/QbQHGYkTfGWQN0lBmp4cGalprQAFs3icFeRHl2D7+tFDr+fg+PCAfR/NsL5
eGDNXhNiymVnl6AFVHpM3eLvefcc3yTXOuvI5q2IMqRSyIjd+aiYoQrBUGPjaElz
suXQPZQQnKl1UOb4GNoiBB+ocdjUcR/CUNIPgOUErMp1c+fsFIWnCJy5NiAOHdcQ
j+DeIXwe/IEvkVXMP6L2R26pX+6ckhzANBJdzW/aTg9Fbb0bbOggsmHx0ItvEK1F
odztcIi2ldYt1d1Z3bkOn4+ATGgMy/V5wgu2rpjqlmOQCGQOvkEL9qgp0vyzAP8u
EbRjD7rmZT6yLC4hJemTsI8zR3x4YOOdoG/ZCTgKg6IicOfVwspaUJOdVPo2poIk
rWTsQ3ePNKRI0nicIPDF7lLwIw19wGc23T4TaqfcaH+fr8QPQAA=
=1ip1
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=KsPc
-----END PGP SIGNATURE-----