<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libarchive</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:2615-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-12-03T14:47:57Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-12-03T14:47:57Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-12-03T14:47:57Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libarchive</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libarchive fixes the following issues:

Security issues fixed:

- CVE-2018-1000877: Fixed a double free vulnerability in RAR decoder (bsc#1120653).
- CVE-2018-1000878: Fixed a Use-After-Free vulnerability in RAR decoder (bsc#1120654).
- CVE-2019-1000019: Fixed an Out-Of-Bounds Read vulnerability in 7zip decompression (bsc#1124341).
- CVE-2019-1000020: Fixed an Infinite Loop vulnerability in ISO9660 parser (bsc#1124342).
- CVE-2019-18408: Fixed a use-after-free in RAR format support (bsc#1155079).

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-2615</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:2615-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120653</URL>
      <Description>SUSE Bug 1120653</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1120654</URL>
      <Description>SUSE Bug 1120654</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1124341</URL>
      <Description>SUSE Bug 1124341</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1124342</URL>
      <Description>SUSE Bug 1124342</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1155079</URL>
      <Description>SUSE Bug 1155079</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1000877/</URL>
      <Description>SUSE CVE CVE-2018-1000877 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1000878/</URL>
      <Description>SUSE CVE CVE-2018-1000878 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1000019/</URL>
      <Description>SUSE CVE CVE-2019-1000019 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-1000020/</URL>
      <Description>SUSE CVE CVE-2019-1000020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-18408/</URL>
      <Description>SUSE CVE CVE-2019-18408 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="bsdtar-3.3.2-lp150.10.1">
      <FullProductName ProductID="bsdtar-3.3.2-lp150.10.1">bsdtar-3.3.2-lp150.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libarchive-devel-3.3.2-lp150.10.1">
      <FullProductName ProductID="libarchive-devel-3.3.2-lp150.10.1">libarchive-devel-3.3.2-lp150.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libarchive13-3.3.2-lp150.10.1">
      <FullProductName ProductID="libarchive13-3.3.2-lp150.10.1">libarchive13-3.3.2-lp150.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libarchive13-32bit-3.3.2-lp150.10.1">
      <FullProductName ProductID="libarchive13-32bit-3.3.2-lp150.10.1">libarchive13-32bit-3.3.2-lp150.10.1</FullProductName>
    </Branch>
    <Relationship ProductReference="bsdtar-3.3.2-lp150.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:bsdtar-3.3.2-lp150.10.1">bsdtar-3.3.2-lp150.10.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libarchive-devel-3.3.2-lp150.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libarchive-devel-3.3.2-lp150.10.1">libarchive-devel-3.3.2-lp150.10.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libarchive13-3.3.2-lp150.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libarchive13-3.3.2-lp150.10.1">libarchive13-3.3.2-lp150.10.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libarchive13-32bit-3.3.2-lp150.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libarchive13-32bit-3.3.2-lp150.10.1">libarchive13-32bit-3.3.2-lp150.10.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar-&gt;lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.</Note>
    </Notes>
    <CVE>CVE-2018-1000877</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:bsdtar-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive-devel-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive13-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive13-32bit-3.3.2-lp150.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000877.html</URL>
        <Description>CVE-2018-1000877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120653</URL>
        <Description>SUSE Bug 1120653</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.</Note>
    </Notes>
    <CVE>CVE-2018-1000878</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:bsdtar-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive-devel-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive13-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive13-32bit-3.3.2-lp150.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000878.html</URL>
        <Description>CVE-2018-1000878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120654</URL>
        <Description>SUSE Bug 1120654</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libarchive version commit bf9aec176c6748f0ee7a678c5f9f9555b9a757c1 onwards (release v3.0.2 onwards) contains a CWE-125: Out-of-bounds Read vulnerability in 7zip decompression, archive_read_support_format_7zip.c, header_bytes() that can result in a crash (denial of service). This attack appears to be exploitable via the victim opening a specially crafted 7zip file.</Note>
    </Notes>
    <CVE>CVE-2019-1000019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:bsdtar-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive-devel-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive13-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive13-32bit-3.3.2-lp150.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1000019.html</URL>
        <Description>CVE-2019-1000019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124341</URL>
        <Description>SUSE Bug 1124341</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0 onwards) contains a CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ISO9660 parser, archive_read_support_format_iso9660.c, read_CE()/parse_rockridge() that can result in DoS by infinite loop. This attack appears to be exploitable via the victim opening a specially crafted ISO9660 file.</Note>
    </Notes>
    <CVE>CVE-2019-1000020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:bsdtar-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive-devel-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive13-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive13-32bit-3.3.2-lp150.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-1000020.html</URL>
        <Description>CVE-2019-1000020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124342</URL>
        <Description>SUSE Bug 1124342</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">archive_read_format_rar_read_data in archive_read_support_format_rar.c in libarchive before 3.4.0 has a use-after-free in a certain ARCHIVE_FAILED situation, related to Ppmd7_DecodeSymbol.</Note>
    </Notes>
    <CVE>CVE-2019-18408</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:bsdtar-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive-devel-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive13-3.3.2-lp150.10.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libarchive13-32bit-3.3.2-lp150.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-18408.html</URL>
        <Description>CVE-2019-18408</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155079</URL>
        <Description>SUSE Bug 1155079</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
