{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"bsdtar-3.5.1-1.5 on GA media","title":"Title of the patch"},{"category":"description","text":"These are all security issues fixed in the bsdtar-3.5.1-1.5 package on the GA media of openSUSE Tumbleweed.","title":"Description of the patch"},{"category":"details","text":"openSUSE-Tumbleweed-2024-10925","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10925-1.json"},{"category":"self","summary":"SUSE CVE CVE-2006-5680 page","url":"https://www.suse.com/security/cve/CVE-2006-5680/"},{"category":"self","summary":"SUSE CVE CVE-2007-3641 page","url":"https://www.suse.com/security/cve/CVE-2007-3641/"},{"category":"self","summary":"SUSE CVE CVE-2017-14166 page","url":"https://www.suse.com/security/cve/CVE-2017-14166/"},{"category":"self","summary":"SUSE CVE CVE-2017-14501 page","url":"https://www.suse.com/security/cve/CVE-2017-14501/"},{"category":"self","summary":"SUSE CVE CVE-2018-1000877 page","url":"https://www.suse.com/security/cve/CVE-2018-1000877/"},{"category":"self","summary":"SUSE CVE CVE-2018-1000878 page","url":"https://www.suse.com/security/cve/CVE-2018-1000878/"},{"category":"self","summary":"SUSE CVE CVE-2018-1000879 page","url":"https://www.suse.com/security/cve/CVE-2018-1000879/"},{"category":"self","summary":"SUSE CVE CVE-2018-1000880 page","url":"https://www.suse.com/security/cve/CVE-2018-1000880/"},{"category":"self","summary":"SUSE CVE CVE-2019-1000019 page","url":"https://www.suse.com/security/cve/CVE-2019-1000019/"},{"category":"self","summary":"SUSE CVE CVE-2019-1000020 page","url":"https://www.suse.com/security/cve/CVE-2019-1000020/"},{"category":"self","summary":"SUSE CVE CVE-2019-18408 page","url":"https://www.suse.com/security/cve/CVE-2019-18408/"},{"category":"self","summary":"SUSE CVE CVE-2019-19221 page","url":"https://www.suse.com/security/cve/CVE-2019-19221/"}],"title":"bsdtar-3.5.1-1.5 on GA media","tracking":{"current_release_date":"2024-06-15T00:00:00Z","generator":{"date":"2024-06-15T00:00:00Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2024:10925-1","initial_release_date":"2024-06-15T00:00:00Z","revision_history":[{"date":"2024-06-15T00:00:00Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"bsdtar-3.5.1-1.5.aarch64","product":{"name":"bsdtar-3.5.1-1.5.aarch64","product_id":"bsdtar-3.5.1-1.5.aarch64"}},{"category":"product_version","name":"libarchive-devel-3.5.1-1.5.aarch64","product":{"name":"libarchive-devel-3.5.1-1.5.aarch64","product_id":"libarchive-devel-3.5.1-1.5.aarch64"}},{"category":"product_version","name":"libarchive13-3.5.1-1.5.aarch64","product":{"name":"libarchive13-3.5.1-1.5.aarch64","product_id":"libarchive13-3.5.1-1.5.aarch64"}},{"category":"product_version","name":"libarchive13-32bit-3.5.1-1.5.aarch64","product":{"name":"libarchive13-32bit-3.5.1-1.5.aarch64","product_id":"libarchive13-32bit-3.5.1-1.5.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"bsdtar-3.5.1-1.5.ppc64le","product":{"name":"bsdtar-3.5.1-1.5.ppc64le","product_id":"bsdtar-3.5.1-1.5.ppc64le"}},{"category":"product_version","name":"libarchive-devel-3.5.1-1.5.ppc64le","product":{"name":"libarchive-devel-3.5.1-1.5.ppc64le","product_id":"libarchive-devel-3.5.1-1.5.ppc64le"}},{"category":"product_version","name":"libarchive13-3.5.1-1.5.ppc64le","product":{"name":"libarchive13-3.5.1-1.5.ppc64le","product_id":"libarchive13-3.5.1-1.5.ppc64le"}},{"category":"product_version","name":"libarchive13-32bit-3.5.1-1.5.ppc64le","product":{"name":"libarchive13-32bit-3.5.1-1.5.ppc64le","product_id":"libarchive13-32bit-3.5.1-1.5.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"bsdtar-3.5.1-1.5.s390x","product":{"name":"bsdtar-3.5.1-1.5.s390x","product_id":"bsdtar-3.5.1-1.5.s390x"}},{"category":"product_version","name":"libarchive-devel-3.5.1-1.5.s390x","product":{"name":"libarchive-devel-3.5.1-1.5.s390x","product_id":"libarchive-devel-3.5.1-1.5.s390x"}},{"category":"product_version","name":"libarchive13-3.5.1-1.5.s390x","product":{"name":"libarchive13-3.5.1-1.5.s390x","product_id":"libarchive13-3.5.1-1.5.s390x"}},{"category":"product_version","name":"libarchive13-32bit-3.5.1-1.5.s390x","product":{"name":"libarchive13-32bit-3.5.1-1.5.s390x","product_id":"libarchive13-32bit-3.5.1-1.5.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"bsdtar-3.5.1-1.5.x86_64","product":{"name":"bsdtar-3.5.1-1.5.x86_64","product_id":"bsdtar-3.5.1-1.5.x86_64"}},{"category":"product_version","name":"libarchive-devel-3.5.1-1.5.x86_64","product":{"name":"libarchive-devel-3.5.1-1.5.x86_64","product_id":"libarchive-devel-3.5.1-1.5.x86_64"}},{"category":"product_version","name":"libarchive13-3.5.1-1.5.x86_64","product":{"name":"libarchive13-3.5.1-1.5.x86_64","product_id":"libarchive13-3.5.1-1.5.x86_64"}},{"category":"product_version","name":"libarchive13-32bit-3.5.1-1.5.x86_64","product":{"name":"libarchive13-32bit-3.5.1-1.5.x86_64","product_id":"libarchive13-32bit-3.5.1-1.5.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"bsdtar-3.5.1-1.5.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64"},"product_reference":"bsdtar-3.5.1-1.5.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"bsdtar-3.5.1-1.5.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le"},"product_reference":"bsdtar-3.5.1-1.5.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"bsdtar-3.5.1-1.5.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x"},"product_reference":"bsdtar-3.5.1-1.5.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"bsdtar-3.5.1-1.5.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64"},"product_reference":"bsdtar-3.5.1-1.5.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive-devel-3.5.1-1.5.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64"},"product_reference":"libarchive-devel-3.5.1-1.5.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive-devel-3.5.1-1.5.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le"},"product_reference":"libarchive-devel-3.5.1-1.5.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive-devel-3.5.1-1.5.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x"},"product_reference":"libarchive-devel-3.5.1-1.5.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive-devel-3.5.1-1.5.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64"},"product_reference":"libarchive-devel-3.5.1-1.5.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-3.5.1-1.5.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64"},"product_reference":"libarchive13-3.5.1-1.5.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-3.5.1-1.5.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le"},"product_reference":"libarchive13-3.5.1-1.5.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-3.5.1-1.5.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x"},"product_reference":"libarchive13-3.5.1-1.5.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-3.5.1-1.5.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64"},"product_reference":"libarchive13-3.5.1-1.5.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-32bit-3.5.1-1.5.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64"},"product_reference":"libarchive13-32bit-3.5.1-1.5.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-32bit-3.5.1-1.5.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le"},"product_reference":"libarchive13-32bit-3.5.1-1.5.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-32bit-3.5.1-1.5.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x"},"product_reference":"libarchive13-32bit-3.5.1-1.5.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"libarchive13-32bit-3.5.1-1.5.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"},"product_reference":"libarchive13-32bit-3.5.1-1.5.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2006-5680","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2006-5680"}],"notes":[{"category":"general","text":"The libarchive library in FreeBSD 6-STABLE after 2006-09-05 and before 2006-11-08 allows context-dependent attackers to cause a denial of service (CPU consumption) via a malformed archive that causes libarchive to skip a region past the actual end of the archive, which triggers an infinite loop that attempts to read more data.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]},"references":[{"category":"external","summary":"CVE-2006-5680","url":"https://www.suse.com/security/cve/CVE-2006-5680"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2006-5680"},{"cve":"CVE-2007-3641","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2007-3641"}],"notes":[{"category":"general","text":"archive_read_support_format_tar.c in libarchive before 2.2.4 does not properly compute the length of a certain buffer when processing a malformed pax extension header, which allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) PAX or (2) TAR archive that triggers a buffer overflow.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]},"references":[{"category":"external","summary":"CVE-2007-3641","url":"https://www.suse.com/security/cve/CVE-2007-3641"},{"category":"external","summary":"SUSE Bug 291358 for CVE-2007-3641","url":"https://bugzilla.suse.com/291358"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"critical"}],"title":"CVE-2007-3641"},{"cve":"CVE-2017-14166","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-14166"}],"notes":[{"category":"general","text":"libarchive 3.3.2 allows remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-14166","url":"https://www.suse.com/security/cve/CVE-2017-14166"},{"category":"external","summary":"SUSE Bug 1057514 for CVE-2017-14166","url":"https://bugzilla.suse.com/1057514"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2017-14166"},{"cve":"CVE-2017-14501","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2017-14501"}],"notes":[{"category":"general","text":"An out-of-bounds read flaw exists in parse_file_info in archive_read_support_format_iso9660.c in libarchive 3.3.2 when extracting a specially crafted iso9660 iso file, related to archive_read_format_iso9660_read_header.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]},"references":[{"category":"external","summary":"CVE-2017-14501","url":"https://www.suse.com/security/cve/CVE-2017-14501"},{"category":"external","summary":"SUSE Bug 1059139 for CVE-2017-14501","url":"https://bugzilla.suse.com/1059139"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2017-14501"},{"cve":"CVE-2018-1000877","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-1000877"}],"notes":[{"category":"general","text":"libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar->lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-1000877","url":"https://www.suse.com/security/cve/CVE-2018-1000877"},{"category":"external","summary":"SUSE Bug 1120653 for CVE-2018-1000877","url":"https://bugzilla.suse.com/1120653"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2018-1000877"},{"cve":"CVE-2018-1000878","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-1000878"}],"notes":[{"category":"general","text":"libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-1000878","url":"https://www.suse.com/security/cve/CVE-2018-1000878"},{"category":"external","summary":"SUSE Bug 1120654 for CVE-2018-1000878","url":"https://bugzilla.suse.com/1120654"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2018-1000878"},{"cve":"CVE-2018-1000879","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-1000879"}],"notes":[{"category":"general","text":"libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted archive file.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-1000879","url":"https://www.suse.com/security/cve/CVE-2018-1000879"},{"category":"external","summary":"SUSE Bug 1120656 for CVE-2018-1000879","url":"https://bugzilla.suse.com/1120656"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2018-1000879"},{"cve":"CVE-2018-1000880","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-1000880"}],"notes":[{"category":"general","text":"libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This attack appear to be exploitable via the victim must open a specially crafted WARC file.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-1000880","url":"https://www.suse.com/security/cve/CVE-2018-1000880"},{"category":"external","summary":"SUSE Bug 1120659 for CVE-2018-1000880","url":"https://bugzilla.suse.com/1120659"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2018-1000880"},{"cve":"CVE-2019-1000019","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-1000019"}],"notes":[{"category":"general","text":"libarchive version commit bf9aec176c6748f0ee7a678c5f9f9555b9a757c1 onwards (release v3.0.2 onwards) contains a CWE-125: Out-of-bounds Read vulnerability in 7zip decompression, archive_read_support_format_7zip.c, header_bytes() that can result in a crash (denial of service). This attack appears to be exploitable via the victim opening a specially crafted 7zip file.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-1000019","url":"https://www.suse.com/security/cve/CVE-2019-1000019"},{"category":"external","summary":"SUSE Bug 1124341 for CVE-2019-1000019","url":"https://bugzilla.suse.com/1124341"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2019-1000019"},{"cve":"CVE-2019-1000020","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-1000020"}],"notes":[{"category":"general","text":"libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0 onwards) contains a CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ISO9660 parser, archive_read_support_format_iso9660.c, read_CE()/parse_rockridge() that can result in DoS by infinite loop. This attack appears to be exploitable via the victim opening a specially crafted ISO9660 file.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-1000020","url":"https://www.suse.com/security/cve/CVE-2019-1000020"},{"category":"external","summary":"SUSE Bug 1124342 for CVE-2019-1000020","url":"https://bugzilla.suse.com/1124342"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2019-1000020"},{"cve":"CVE-2019-18408","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-18408"}],"notes":[{"category":"general","text":"archive_read_format_rar_read_data in archive_read_support_format_rar.c in libarchive before 3.4.0 has a use-after-free in a certain ARCHIVE_FAILED situation, related to Ppmd7_DecodeSymbol.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-18408","url":"https://www.suse.com/security/cve/CVE-2019-18408"},{"category":"external","summary":"SUSE Bug 1155079 for CVE-2019-18408","url":"https://bugzilla.suse.com/1155079"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-18408"},{"cve":"CVE-2019-19221","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-19221"}],"notes":[{"category":"general","text":"In Libarchive 3.4.0, archive_wstring_append_from_mbs in archive_string.c has an out-of-bounds read because of an incorrect mbrtowc or mbtowc call. For example, bsdtar crashes via a crafted archive.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-19221","url":"https://www.suse.com/security/cve/CVE-2019-19221"},{"category":"external","summary":"SUSE Bug 1157569 for CVE-2019-19221","url":"https://bugzilla.suse.com/1157569"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:bsdtar-3.5.1-1.5.aarch64","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.s390x","openSUSE Tumbleweed:bsdtar-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive-devel-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-3.5.1-1.5.x86_64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.aarch64","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.ppc64le","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.s390x","openSUSE Tumbleweed:libarchive13-32bit-3.5.1-1.5.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2019-19221"}]}