Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2018:0862-1

Опубликовано: 03 апр. 2018
Источник: suse-cvrf

Описание

Security update for unrar

This update for unrar to version 5.6.1 fixes several issues.

These security issues were fixed:

  • CVE-2017-12938: Prevent remote attackers to bypass a directory-traversal protection mechanism via vectors involving a symlink to the . directory, a symlink to the .. directory, and a regular file (bsc#1054038).
  • CVE-2017-12940: Prevent out-of-bounds read in the EncodeFileName::Decode call within the Archive::ReadHeader15 function (bsc#1054038).
  • CVE-2017-12941: Prevent an out-of-bounds read in the Unpack::Unpack20 function (bsc#1054038).
  • CVE-2017-12942: Prevent a buffer overflow in the Unpack::LongLZ function (bsc#1054038).

These non-security issues were fixed:

  • Added extraction support for .LZ archives created by Lzip compressor
  • Enable unpacking of files in ZIP archives compressed with XZ algorithm and encrypted with AES
  • Added support for PAX extended headers inside of TAR archive
  • If RAR recovery volumes (.rev files) are present in the same folder as usual RAR volumes, archive test command verifies .rev contents after completing testing .rar files
  • By default unrar skips symbolic links with absolute paths in link target when extracting unless -ola command line switch is specified
  • Added support for AES-NI CPU instructions
  • Support for a new RAR 5.0 archiving format
  • Wildcard exclusion mask for folders
  • Added libunrar* and libunrar*-devel subpackages (bsc#513804)
  • Prevent conditional jumps depending on uninitialised values (bsc#1046882)

Список пакетов

SUSE Linux Enterprise Server 11 SP4
unrar-5.6.1-5.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4
unrar-5.6.1-5.3.1

Описание

A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the "DestPos" variable, which allows the attacker to write out of bounds when setting Mem[DestPos].


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:unrar-5.6.1-5.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4:unrar-5.6.1-5.3.1

Ссылки

Описание

UnRAR before 5.5.7 allows remote attackers to bypass a directory-traversal protection mechanism via vectors involving a symlink to the . directory, a symlink to the .. directory, and a regular file.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:unrar-5.6.1-5.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4:unrar-5.6.1-5.3.1

Ссылки

Описание

libunrar.a in UnRAR before 5.5.7 has an out-of-bounds read in the EncodeFileName::Decode call within the Archive::ReadHeader15 function.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:unrar-5.6.1-5.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4:unrar-5.6.1-5.3.1

Ссылки

Описание

libunrar.a in UnRAR before 5.5.7 has an out-of-bounds read in the Unpack::Unpack20 function.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:unrar-5.6.1-5.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4:unrar-5.6.1-5.3.1

Ссылки

Описание

libunrar.a in UnRAR before 5.5.7 has a buffer overflow in the Unpack::LongLZ function.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:unrar-5.6.1-5.3.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4:unrar-5.6.1-5.3.1

Ссылки
Уязвимость SUSE-SU-2018:0862-1