Linux Security
    Linux Security
    Linux Security

    Debian: New libarchive1 packages fix several problems

    Date 08 Jan 2008
    Posted By LinuxSecurity Advisories
    It was discovered that libarchive1 would miscompute the length of a buffer resulting in a buffer overflow if yet another type of corruption occurred in a pax extension header.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1455-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                               Steve Kemp
    January 08, 2008            
    - ------------------------------------------------------------------------
    Package        : libarchive1
    Vulnerability  : denial of service
    Problem type   : local
    Debian-specific: no
    CVE Id(s)      : CVE-2007-3641, CVE-2007-3644, CVE-2007-3645
    Debian Bug     : 432924
    Several local/remote vulnerabilities have been discovered in libarchive1,
    a single library to read/write tar, cpio, pax, zip, iso9660, archives.
    The Common Vulnerabilities and Exposures project identifies the following
      It was discovered that libarchive1 would miscompute the length of a buffer
      resulting in a buffer overflow if yet another type of corruption occurred
      in a pax extension header.
      It was discovered that if an archive prematurely ended within a pax
      extension header the libarchive1 library could enter an infinite loop.
      If an archive prematurely ended within a tar header, immediately following
      a pax extension header, libarchive1 could dereference a NULL pointer.
    The old stable distribution (sarge), does not contain this package.
    For the stable distribution (etch), these problems have been fixed in
    version 1.2.53-2etch1.
    For the unstable distribution (sid), these problems have been fixed in
    version 2.2.4-1.
    We recommend that you upgrade your libarchive package.
    Upgrade instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    Source archives:
        Size/MD5 checksum:     6474 454b6a56eec392fff05fde2e39b33241
        Size/MD5 checksum:   522540 2e2df461fef05049b3a92e5bedc2de2c
        Size/MD5 checksum:      723 6bd6417d5da3132138dfec988dd0b484
    alpha architecture (DEC Alpha)
        Size/MD5 checksum:   125468 c5f6ca3fbd4dc58994e3322c54665189
        Size/MD5 checksum:    98258 7052caa8ea03fb8f8028e779c38007a9
        Size/MD5 checksum:    80802 e1cbce6999ca08b7c1873a2aa6f37ace
    amd64 architecture (AMD x86_64 (AMD64))
        Size/MD5 checksum:    86144 75bbf5bd14366b2750a9fd07b94ea651
        Size/MD5 checksum:   100862 d7d29d3b8712a1affdd661ce8671cc47
        Size/MD5 checksum:    73082 965a207cd79e4516897997dd4aa38224
    arm architecture (ARM)
        Size/MD5 checksum:    71100 ccb4fadaa27c86e51657bcd364900a12
        Size/MD5 checksum:    81560 6f300693d1c7e58758ffb58cb3792aa7
        Size/MD5 checksum:    94672 f9153798aead194d92167ffce2eebac8
    hppa architecture (HP PA RISC)
        Size/MD5 checksum:    95492 fed8bf705c7d5376bccf45caaedccdaf
        Size/MD5 checksum:    84962 69e703f5aaa825319b89038d0a69e5ac
        Size/MD5 checksum:   112720 4fee8dd2b8ff9d8c9d76cbfba4306899
    i386 architecture (Intel ia32)
        Size/MD5 checksum:    73122 9ae44a93dbe577fea5a3121b32e00bf5
        Size/MD5 checksum:    95600 e3e924b9c25d33d9412ab66e5745002b
        Size/MD5 checksum:    82918 5f52d186b87c77092c092836ad457585
    ia64 architecture (Intel ia64)
        Size/MD5 checksum:   137198 d70c90ede254b30bf9aaf3c007d63857
        Size/MD5 checksum:   102126 416f120362f22dc2893100c4e792ee0d
        Size/MD5 checksum:   128994 84198707b6b30b4ef930ba3afe3adfd7
    mips architecture (MIPS (Big Endian))
        Size/MD5 checksum:    95926 655725e49f4f959e1afaf5c5841cf2c7
        Size/MD5 checksum:   111874 01d7e04b7549d71d674a1f2915ba66f7
        Size/MD5 checksum:    75320 64c5129262db87e5f1b1d82ceff8ef0e
    mipsel architecture (MIPS (Little Endian))
        Size/MD5 checksum:   111642 1cf3bb9888ff64850c02cbc99b83d611
        Size/MD5 checksum:    75418 61b96ae77191c67eb3beacd1245aaf12
        Size/MD5 checksum:    95860 492c4e45c2dc1ace2339745eeea1c319
    powerpc architecture (PowerPC)
        Size/MD5 checksum:   104546 24fa06af05ae8d48cf8d3e984ed6d111
        Size/MD5 checksum:    90134 17b8989ca59c23bdc0176f71828e226f
        Size/MD5 checksum:    77998 5cc5f86178e581a46fb0c4a27240aefe
    s390 architecture (IBM S/390)
        Size/MD5 checksum:    92394 5d0973a9c4de0a8005a5cab249d4a274
        Size/MD5 checksum:   103250 33642bf02c416cf2e30e18d3fc1f334a
        Size/MD5 checksum:    80726 c96397d26d8c83b155d5cacf05f426d8
    sparc architecture (Sun SPARC/UltraSPARC)
        Size/MD5 checksum:    80566 a4e51eebda2a152b1972b17c405ee08a
        Size/MD5 checksum:    71482 82143b931eb382f3299808efce254f26
        Size/MD5 checksum:    96164 80379aa102dc6cf97befdd648e7831f4
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"10","type":"x","order":"1","pct":32.26,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":19.35,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":48.39,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.