{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"bsdtar-3.2.2-2.1 on GA media","title":"Title of the patch"},{"category":"description","text":"These are all security issues fixed in the bsdtar-3.2.2-2.1 package on the GA media of openSUSE Tumbleweed.","title":"Description of the patch"},{"category":"details","text":"openSUSE-Tumbleweed-2024-10127","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10127-1.json"},{"category":"self","summary":"SUSE CVE CVE-2013-0211 page","url":"https://www.suse.com/security/cve/CVE-2013-0211/"},{"category":"self","summary":"SUSE CVE CVE-2015-2304 page","url":"https://www.suse.com/security/cve/CVE-2015-2304/"},{"category":"self","summary":"SUSE CVE CVE-2015-8917 page","url":"https://www.suse.com/security/cve/CVE-2015-8917/"},{"category":"self","summary":"SUSE CVE CVE-2015-8928 page","url":"https://www.suse.com/security/cve/CVE-2015-8928/"},{"category":"self","summary":"SUSE CVE CVE-2015-8933 page","url":"https://www.suse.com/security/cve/CVE-2015-8933/"},{"category":"self","summary":"SUSE CVE CVE-2015-8934 page","url":"https://www.suse.com/security/cve/CVE-2015-8934/"},{"category":"self","summary":"SUSE CVE CVE-2016-1541 page","url":"https://www.suse.com/security/cve/CVE-2016-1541/"},{"category":"self","summary":"SUSE CVE CVE-2016-4300 page","url":"https://www.suse.com/security/cve/CVE-2016-4300/"},{"category":"self","summary":"SUSE CVE CVE-2016-4301 page","url":"https://www.suse.com/security/cve/CVE-2016-4301/"},{"category":"self","summary":"SUSE CVE CVE-2016-4809 page","url":"https://www.suse.com/security/cve/CVE-2016-4809/"},{"category":"self","summary":"SUSE CVE CVE-2016-5418 page","url":"https://www.suse.com/security/cve/CVE-2016-5418/"},{"category":"self","summary":"SUSE CVE CVE-2016-5844 page","url":"https://www.suse.com/security/cve/CVE-2016-5844/"},{"category":"self","summary":"SUSE CVE CVE-2016-6250 page","url":"https://www.suse.com/security/cve/CVE-2016-6250/"},{"category":"self","summary":"SUSE CVE CVE-2016-8687 page","url":"https://www.suse.com/security/cve/CVE-2016-8687/"},{"category":"self","summary":"SUSE CVE CVE-2016-8688 page","url":"https://www.suse.com/security/cve/CVE-2016-8688/"},{"category":"self","summary":"SUSE CVE CVE-2016-8689 page","url":"https://www.suse.com/security/cve/CVE-2016-8689/"}],"title":"bsdtar-3.2.2-2.1 on GA media","tracking":{"current_release_date":"2024-06-15T00:00:00Z","generator":{"date":"2024-06-15T00:00:00Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2024:10127-1","initial_release_date":"2024-06-15T00:00:00Z","revision_history":[{"date":"2024-06-15T00:00:00Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"bsdtar-3.2.2-2.1.aarch64","product":{"name":"bsdtar-3.2.2-2.1.aarch64","product_id":"bsdtar-3.2.2-2.1.aarch64"}},{"category":"product_version","name":"libarchive-devel-3.2.2-2.1.aarch64","product":{"name":"libarchive-devel-3.2.2-2.1.aarch64","product_id":"libarchive-devel-3.2.2-2.1.aarch64"}},{"category":"product_version","name":"libarchive13-3.2.2-2.1.aarch64","product":{"name":"libarchive13-3.2.2-2.1.aarch64","product_id":"libarchive13-3.2.2-2.1.aarch64"}},{"category":"product_version","name":"libarchive13-32bit-3.2.2-2.1.aarch64","product":{"name":"libarchive13-32bit-3.2.2-2.1.aarch64","product_id":"libarchive13-32bit-3.2.2-2.1.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"bsdtar-3.2.2-2.1.ppc64le","product":{"name":"bsdtar-3.2.2-2.1.ppc64le","product_id":"bsdtar-3.2.2-2.1.ppc64le"}},{"category":"product_version","name":"libarchive-devel-3.2.2-2.1.ppc64le","product":{"name":"libarchive-devel-3.2.2-2.1.ppc64le","product_id":"libarchive-devel-3.2.2-2.1.ppc64le"}},{"category":"product_version","name":"libarchive13-3.2.2-2.1.ppc64le","product":{"name":"libarchive13-3.2.2-2.1.ppc64le","product_id":"libarchive13-3.2.2-2.1.ppc64le"}},{"category":"product_version","name":"libarchive13-32bit-3.2.2-2.1.ppc64le","product":{"name":"libarchive13-32bit-3.2.2-2.1.ppc64le","product_id":"libarchive13-32bit-3.2.2-2.1.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"bsdtar-3.2.2-2.1.s390x","product":{"name":"bsdtar-3.2.2-2.1.s390x","product_id":"bsdtar-3.2.2-2.1.s390x"}},{"category":"product_version","name":"libarchive-devel-3.2.2-2.1.s390x","product":{"name":"libarchive-devel-3.2.2-2.1.s390x","product_id":"libarchive-devel-3.2.2-2.1.s390x"}},{"category":"product_version","name":"libarchive13-3.2.2-2.1.s390x","product":{"name":"libarchive13-3.2.2-2.1.s390x","product_id":"libarchive13-3.2.2-2.1.s390x"}},{"category":"product_version","name":"libarchive13-32bit-3.2.2-2.1.s390x","product":{"name":"libarchive13-32bit-3.2.2-2.1.s390x","product_id":"libarchive13-32bit-3.2.2-2.1.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"bsdtar-3.2.2-2.1.x86_64","product":{"name":"bsdtar-3.2.2-2.1.x86_64","product_id":"bsdtar-3.2.2-2.1.x86_64"}},{"category":"product_version","name":"libarchive-devel-3.2.2-2.1.x86_64","product":{"name":"libarchive-devel-3.2.2-2.1.x86_64","product_id":"libarchive-devel-3.2.2-2.1.x86_64"}},{"category":"product_version","name":"libarchive13-3.2.2-2.1.x86_64","product":{"name":"libarchive13-3.2.2-2.1.x86_64","product_id":"libarchive13-3.2.2-2.1.x86_64"}},{"category":"product_version","name":"libarchive13-32bit-3.2.2-2.1.x86_64","product":{"name":"libarchive13-32bit-3.2.2-2.1.x86_64","product_id":"libarchive13-32bit-3.2.2-2.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"bsdtar-3.2.2-2.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64"},"product_reference":"bsdtar-3.2.2-2.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"bsdtar-3.2.2-2.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le"},"product_reference":"bsdtar-3.2.2-2.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"bsdtar-3.2.2-2.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x"},"product_reference":"bsdtar-3.2.2-2.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"bsdtar-3.2.2-2.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64"},"product_reference":"bsdtar-3.2.2-2.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive-devel-3.2.2-2.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64"},"product_reference":"libarchive-devel-3.2.2-2.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive-devel-3.2.2-2.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le"},"product_reference":"libarchive-devel-3.2.2-2.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive-devel-3.2.2-2.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x"},"product_reference":"libarchive-devel-3.2.2-2.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive-devel-3.2.2-2.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64"},"product_reference":"libarchive-devel-3.2.2-2.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-3.2.2-2.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64"},"product_reference":"libarchive13-3.2.2-2.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-3.2.2-2.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le"},"product_reference":"libarchive13-3.2.2-2.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-3.2.2-2.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x"},"product_reference":"libarchive13-3.2.2-2.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-3.2.2-2.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64"},"product_reference":"libarchive13-3.2.2-2.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-32bit-3.2.2-2.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64"},"product_reference":"libarchive13-32bit-3.2.2-2.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-32bit-3.2.2-2.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le"},"product_reference":"libarchive13-32bit-3.2.2-2.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-32bit-3.2.2-2.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x"},"product_reference":"libarchive13-32bit-3.2.2-2.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-32bit-3.2.2-2.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"},"product_reference":"libarchive13-32bit-3.2.2-2.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2013-0211","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2013-0211"}],"notes":[{"category":"general","text":"Integer signedness error in the archive_write_zip_data function in archive_write_set_format_zip.c in libarchive 3.1.2 and earlier, when running on 64-bit machines, allows context-dependent attackers to cause a denial of service (crash) via unspecified vectors, which triggers an improper conversion between unsigned and signed types, leading to a buffer overflow.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2013-0211","url":"https://www.suse.com/security/cve/CVE-2013-0211"},{"category":"external","summary":"SUSE Bug 800024 for CVE-2013-0211","url":"https://bugzilla.suse.com/800024"},{"category":"external","summary":"SUSE Bug 979005 for CVE-2013-0211","url":"https://bugzilla.suse.com/979005"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2013-0211"},{"cve":"CVE-2015-2304","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-2304"}],"notes":[{"category":"general","text":"Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-2304","url":"https://www.suse.com/security/cve/CVE-2015-2304"},{"category":"external","summary":"SUSE Bug 920870 for CVE-2015-2304","url":"https://bugzilla.suse.com/920870"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2015-2304"},{"cve":"CVE-2015-8917","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-8917"}],"notes":[{"category":"general","text":"bsdtar in libarchive before 3.2.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an invalid character in the name of a cab file.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-8917","url":"https://www.suse.com/security/cve/CVE-2015-8917"},{"category":"external","summary":"SUSE Bug 985691 for CVE-2015-8917","url":"https://bugzilla.suse.com/985691"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2015-8917"},{"cve":"CVE-2015-8928","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-8928"}],"notes":[{"category":"general","text":"The process_add_entry function in archive_read_support_format_mtree.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mtree file.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-8928","url":"https://www.suse.com/security/cve/CVE-2015-8928"},{"category":"external","summary":"SUSE Bug 985679 for CVE-2015-8928","url":"https://bugzilla.suse.com/985679"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2015-8928"},{"cve":"CVE-2015-8933","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-8933"}],"notes":[{"category":"general","text":"Integer overflow in the archive_read_format_tar_skip function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-8933","url":"https://www.suse.com/security/cve/CVE-2015-8933"},{"category":"external","summary":"SUSE Bug 985688 for CVE-2015-8933","url":"https://bugzilla.suse.com/985688"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2015-8933"},{"cve":"CVE-2015-8934","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2015-8934"}],"notes":[{"category":"general","text":"The copy_from_lzss_window function in archive_read_support_format_rar.c in libarchive 3.2.0 and earlier allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted rar file.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2015-8934","url":"https://www.suse.com/security/cve/CVE-2015-8934"},{"category":"external","summary":"SUSE Bug 985673 for CVE-2015-8934","url":"https://bugzilla.suse.com/985673"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2015-8934"},{"cve":"CVE-2016-1541","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-1541"}],"notes":[{"category":"general","text":"Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-1541","url":"https://www.suse.com/security/cve/CVE-2016-1541"},{"category":"external","summary":"SUSE Bug 979005 for CVE-2016-1541","url":"https://bugzilla.suse.com/979005"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-1541"},{"cve":"CVE-2016-4300","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-4300"}],"notes":[{"category":"general","text":"Integer overflow in the read_SubStreamsInfo function in archive_read_support_format_7zip.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a 7zip file with a large number of substreams, which triggers a heap-based buffer overflow.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-4300","url":"https://www.suse.com/security/cve/CVE-2016-4300"},{"category":"external","summary":"SUSE Bug 985832 for CVE-2016-4300","url":"https://bugzilla.suse.com/985832"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-4300"},{"cve":"CVE-2016-4301","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-4301"}],"notes":[{"category":"general","text":"Stack-based buffer overflow in the parse_device function in archive_read_support_format_mtree.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a crafted mtree file.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-4301","url":"https://www.suse.com/security/cve/CVE-2016-4301"},{"category":"external","summary":"SUSE Bug 985826 for CVE-2016-4301","url":"https://bugzilla.suse.com/985826"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-4301"},{"cve":"CVE-2016-4809","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-4809"}],"notes":[{"category":"general","text":"The archive_read_format_cpio_read_header function in archive_read_support_format_cpio.c in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a CPIO archive with a large symlink.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-4809","url":"https://www.suse.com/security/cve/CVE-2016-4809"},{"category":"external","summary":"SUSE Bug 984990 for CVE-2016-4809","url":"https://bugzilla.suse.com/984990"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2016-4809"},{"cve":"CVE-2016-5418","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-5418"}],"notes":[{"category":"general","text":"The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-5418","url":"https://www.suse.com/security/cve/CVE-2016-5418"},{"category":"external","summary":"SUSE Bug 998677 for CVE-2016-5418","url":"https://bugzilla.suse.com/998677"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-5418"},{"cve":"CVE-2016-5844","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-5844"}],"notes":[{"category":"general","text":"Integer overflow in the ISO parser in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a crafted ISO file.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-5844","url":"https://www.suse.com/security/cve/CVE-2016-5844"},{"category":"external","summary":"SUSE Bug 986566 for CVE-2016-5844","url":"https://bugzilla.suse.com/986566"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-5844"},{"cve":"CVE-2016-6250","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-6250"}],"notes":[{"category":"general","text":"Integer overflow in the ISO9660 writer in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-6250","url":"https://www.suse.com/security/cve/CVE-2016-6250"},{"category":"external","summary":"SUSE Bug 989980 for CVE-2016-6250","url":"https://bugzilla.suse.com/989980"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.6,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2016-6250"},{"cve":"CVE-2016-8687","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-8687"}],"notes":[{"category":"general","text":"Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-8687","url":"https://www.suse.com/security/cve/CVE-2016-8687"},{"category":"external","summary":"SUSE Bug 1005070 for CVE-2016-8687","url":"https://bugzilla.suse.com/1005070"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2016-8687"},{"cve":"CVE-2016-8688","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-8688"}],"notes":[{"category":"general","text":"The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-8688","url":"https://www.suse.com/security/cve/CVE-2016-8688"},{"category":"external","summary":"SUSE Bug 1005076 for CVE-2016-8688","url":"https://bugzilla.suse.com/1005076"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-8688"},{"cve":"CVE-2016-8689","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-8689"}],"notes":[{"category":"general","text":"The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2016-8689","url":"https://www.suse.com/security/cve/CVE-2016-8689"},{"category":"external","summary":"SUSE Bug 1005072 for CVE-2016-8689","url":"https://bugzilla.suse.com/1005072"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.2.2-2.1.aarch64","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.s390x","openSUSE Tumbleweed:bsdtar-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive-devel-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-3.2.2-2.1.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.2.2-2.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2016-8689"}]}