Bug 985685 (CVE-2015-8922)

Summary: VUL-1: CVE-2015-8922: bsdtar,libarchive: Null pointer access in 7z parser
Product: [Novell Products] SUSE Security Incidents Reporter: Marcus Meissner <meissner>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P4 - Low CC: jsegitz, smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/170288/
Whiteboard: CVSSv2:SUSE:CVE-2015-8922:4.3:(AV:N/AC:M/Au:N/C:N/I:N/A:P) CVSSv2:RedHat:CVE-2015-8922:3.5:(AV:N/AC:M/Au:S/C:N/I:N/A:P) CVSSv2:NVD:CVE-2015-8922:4.3:(AV:N/AC:M/Au:N/C:N/I:N/A:P) CVSSv3:RedHat:CVE-2015-8922:3.5:(AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Attachments: bsdtar-null-ptr.7z
d094dc.patch

Description Marcus Meissner 2016-06-20 14:42:46 UTC
CVE-2015-8922

> https://github.com/libarchive/libarchive/issues/513
> Null pointer access in 7z parser

Use CVE-2015-8922.


References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8922
http://seclists.org/oss-sec/2016/q2/566
Comment 1 Marcus Meissner 2016-06-20 14:44:11 UTC
Created attachment 681359 [details]
bsdtar-null-ptr.7z

QA REPRODUCER:

bsdtar xf bsdtar-null-ptr.7z

before:
segmentation fault

after:
no segfault
Comment 2 Marcus Meissner 2016-06-20 14:45:44 UTC
Created attachment 681360 [details]
d094dc.patch

d094dc commit patch
Comment 3 Swamp Workflow Management 2016-06-20 22:01:52 UTC
bugbot adjusting priority
Comment 4 Swamp Workflow Management 2016-07-29 12:10:38 UTC
SUSE-SU-2016:1909-1: An update that fixes 20 vulnerabilities is now available.

Category: security (important)
Bug References: 984990,985609,985665,985669,985673,985675,985679,985682,985685,985688,985689,985697,985698,985700,985703,985704,985706,985826,985832,985835
CVE References: CVE-2015-8918,CVE-2015-8919,CVE-2015-8920,CVE-2015-8921,CVE-2015-8922,CVE-2015-8923,CVE-2015-8924,CVE-2015-8925,CVE-2015-8926,CVE-2015-8928,CVE-2015-8929,CVE-2015-8930,CVE-2015-8931,CVE-2015-8932,CVE-2015-8933,CVE-2015-8934,CVE-2016-4300,CVE-2016-4301,CVE-2016-4302,CVE-2016-4809
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP1 (src):    libarchive-3.1.2-22.1
SUSE Linux Enterprise Server 12-SP1 (src):    libarchive-3.1.2-22.1
SUSE Linux Enterprise Desktop 12-SP1 (src):    libarchive-3.1.2-22.1
Comment 5 Swamp Workflow Management 2016-08-11 15:15:12 UTC
openSUSE-SU-2016:2036-1: An update that fixes 20 vulnerabilities is now available.

Category: security (important)
Bug References: 984990,985609,985665,985669,985673,985675,985679,985682,985685,985688,985689,985697,985698,985700,985703,985704,985706,985826,985832,985835
CVE References: CVE-2015-8918,CVE-2015-8919,CVE-2015-8920,CVE-2015-8921,CVE-2015-8922,CVE-2015-8923,CVE-2015-8924,CVE-2015-8925,CVE-2015-8926,CVE-2015-8928,CVE-2015-8929,CVE-2015-8930,CVE-2015-8931,CVE-2015-8932,CVE-2015-8933,CVE-2015-8934,CVE-2016-4300,CVE-2016-4301,CVE-2016-4302,CVE-2016-4809
Sources used:
openSUSE Leap 42.1 (src):    libarchive-3.1.2-13.2
Comment 6 Adrian Schröter 2018-10-10 13:32:14 UTC
is done
Comment 7 Johannes Segitz 2018-10-11 08:13:25 UTC
SUSE will not provide a fix for older products for this issue since the risk to our customers posed by this is negligible.