Linux Security
Linux Security
Linux Security

Debian: New libarchive1 packages fix several problems

Date 08 Jan 2008
Posted By LinuxSecurity Advisories
It was discovered that libarchive1 would miscompute the length of a buffer resulting in a buffer overflow if yet another type of corruption occurred in a pax extension header.
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1455-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                               Steve Kemp
January 08, 2008            
- ------------------------------------------------------------------------

Package        : libarchive1
Vulnerability  : denial of service
Problem type   : local
Debian-specific: no
CVE Id(s)      : CVE-2007-3641, CVE-2007-3644, CVE-2007-3645
Debian Bug     : 432924

Several local/remote vulnerabilities have been discovered in libarchive1,
a single library to read/write tar, cpio, pax, zip, iso9660, archives.

The Common Vulnerabilities and Exposures project identifies the following


  It was discovered that libarchive1 would miscompute the length of a buffer
  resulting in a buffer overflow if yet another type of corruption occurred
  in a pax extension header.


  It was discovered that if an archive prematurely ended within a pax
  extension header the libarchive1 library could enter an infinite loop.


  If an archive prematurely ended within a tar header, immediately following
  a pax extension header, libarchive1 could dereference a NULL pointer.

The old stable distribution (sarge), does not contain this package.

For the stable distribution (etch), these problems have been fixed in
version 1.2.53-2etch1.

For the unstable distribution (sid), these problems have been fixed in
version 2.2.4-1.

We recommend that you upgrade your libarchive package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:
    Size/MD5 checksum:     6474 454b6a56eec392fff05fde2e39b33241
    Size/MD5 checksum:   522540 2e2df461fef05049b3a92e5bedc2de2c
    Size/MD5 checksum:      723 6bd6417d5da3132138dfec988dd0b484

alpha architecture (DEC Alpha)
    Size/MD5 checksum:   125468 c5f6ca3fbd4dc58994e3322c54665189
    Size/MD5 checksum:    98258 7052caa8ea03fb8f8028e779c38007a9
    Size/MD5 checksum:    80802 e1cbce6999ca08b7c1873a2aa6f37ace

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:    86144 75bbf5bd14366b2750a9fd07b94ea651
    Size/MD5 checksum:   100862 d7d29d3b8712a1affdd661ce8671cc47
    Size/MD5 checksum:    73082 965a207cd79e4516897997dd4aa38224

arm architecture (ARM)
    Size/MD5 checksum:    71100 ccb4fadaa27c86e51657bcd364900a12
    Size/MD5 checksum:    81560 6f300693d1c7e58758ffb58cb3792aa7
    Size/MD5 checksum:    94672 f9153798aead194d92167ffce2eebac8

hppa architecture (HP PA RISC)
    Size/MD5 checksum:    95492 fed8bf705c7d5376bccf45caaedccdaf
    Size/MD5 checksum:    84962 69e703f5aaa825319b89038d0a69e5ac
    Size/MD5 checksum:   112720 4fee8dd2b8ff9d8c9d76cbfba4306899

i386 architecture (Intel ia32)
    Size/MD5 checksum:    73122 9ae44a93dbe577fea5a3121b32e00bf5
    Size/MD5 checksum:    95600 e3e924b9c25d33d9412ab66e5745002b
    Size/MD5 checksum:    82918 5f52d186b87c77092c092836ad457585

ia64 architecture (Intel ia64)
    Size/MD5 checksum:   137198 d70c90ede254b30bf9aaf3c007d63857
    Size/MD5 checksum:   102126 416f120362f22dc2893100c4e792ee0d
    Size/MD5 checksum:   128994 84198707b6b30b4ef930ba3afe3adfd7

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum:    95926 655725e49f4f959e1afaf5c5841cf2c7
    Size/MD5 checksum:   111874 01d7e04b7549d71d674a1f2915ba66f7
    Size/MD5 checksum:    75320 64c5129262db87e5f1b1d82ceff8ef0e

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:   111642 1cf3bb9888ff64850c02cbc99b83d611
    Size/MD5 checksum:    75418 61b96ae77191c67eb3beacd1245aaf12
    Size/MD5 checksum:    95860 492c4e45c2dc1ace2339745eeea1c319

powerpc architecture (PowerPC)
    Size/MD5 checksum:   104546 24fa06af05ae8d48cf8d3e984ed6d111
    Size/MD5 checksum:    90134 17b8989ca59c23bdc0176f71828e226f
    Size/MD5 checksum:    77998 5cc5f86178e581a46fb0c4a27240aefe

s390 architecture (IBM S/390)
    Size/MD5 checksum:    92394 5d0973a9c4de0a8005a5cab249d4a274
    Size/MD5 checksum:   103250 33642bf02c416cf2e30e18d3fc1f334a
    Size/MD5 checksum:    80726 c96397d26d8c83b155d5cacf05f426d8

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:    80566 a4e51eebda2a152b1972b17c405ee08a
    Size/MD5 checksum:    71482 82143b931eb382f3299808efce254f26
    Size/MD5 checksum:    96164 80379aa102dc6cf97befdd648e7831f4

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"52","type":"x","order":"1","pct":77.61,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"9","type":"x","order":"2","pct":13.43,"resources":[]},{"id":"181","title":"Hardly ever","votes":"6","type":"x","order":"3","pct":8.96,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.