Lucene search

K
debianDebianDEBIAN:DLA-3202-1:F1E95
HistoryNov 22, 2022 - 5:32 p.m.

[SECURITY] [DLA 3202-1] libarchive security update

2022-11-2217:32:50
lists.debian.org
20
libarchive
security update
cve-2019-19221
cve-2021-23177
cve-2021-31566
debian lts
symlink
acls
debian 10 buster

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

32.7%


Debian LTS Advisory DLA-3202-1 [email protected]
https://www.debian.org/lts/security/ Sylvain Beucler
November 22, 2022 https://wiki.debian.org/LTS


Package : libarchive
Version : 3.3.3-4+deb10u2
CVE ID : CVE-2019-19221 CVE-2021-23177 CVE-2021-31566
Debian Bug : 945287 1001986 1001990

Three issues have been found in libarchive, a multi-format archive and
compression library.

CVE-2019-19221

out-of-bounds read because of an incorrect mbrtowc or mbtowc call

CVE-2021-23177

extracting a symlink with ACLs modifies ACLs of target

CVE-2021-31566

symbolic links incorrectly followed when changing modes, times,
ACL and flags of a file while extracting an archive

For Debian 10 buster, these problems have been fixed in version
3.3.3-4+deb10u2.

We recommend that you upgrade your libarchive packages.

For the detailed security status of libarchive please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libarchive

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

32.7%