Skip to content
This repository has been archived by the owner on Mar 16, 2022. It is now read-only.

1.259.0

Compare
Choose a tag to compare
@cf-buildpacks-eng cf-buildpacks-eng released this 16 Jan 16:01
· 27 commits to master since this release

Notably, this release addresses:

USN-3859-1 USN-3859-1: libarchive vulnerabilities:

  • CVE-2017-14502: read_header in archive_read_support_format_rar.c in libarchive 3.3.2suffers from an off-by-one error for UTF-16 names in RAR archives, leadingto an out-of-bounds read in archive_read_format_rar_read_header.
  • CVE-2018-1000877: libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards(release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability inRAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(),realloc(rar->lzss.window, new_size) with new_size = 0 that can result inCrash/DoS. This attack appear to be exploitable via the victim must open aspecially crafted RAR archive.
  • CVE-2018-1000878: libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards(release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerabilityin RAR decoder - libarchive/archive_read_support_format_rar.c that canresult in Crash/DoS - it is unknown if RCE is possible. This attack appearto be exploitable via the victim must open a specially crafted RAR archive.
  • CVE-2018-1000880: libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards(release v3.2.0 onwards) contains a CWE-20: Improper Input Validationvulnerability in WARC parser -libarchive/archive_read_support_format_warc.c, _warc_read() that can resultin DoS - quasi-infinite run time and disk usage from tiny file. This attackappear to be exploitable via the victim must open a specially crafted WARCfile.
-ii  libarchive13:amd64  3.1.2-7ubuntu2.6  amd64  Multi-format archive and compression library (shared library)
+ii  libarchive13:amd64  3.1.2-7ubuntu2.7  amd64  Multi-format archive and compression library (shared library)