UbuntuUpdates.org

Package "tar"

Name: tar

Description:

GNU version of the tar archiving utility

Latest version: 1.29b-2ubuntu0.4
Release: bionic (18.04)
Level: security
Repository: main

Links


Download "tar"


Other versions of "tar" in Bionic

Repository Area Version
base main 1.29b-2
base universe 1.29b-2
security universe 1.29b-2ubuntu0.4
updates universe 1.29b-2ubuntu0.4
updates main 1.29b-2ubuntu0.4

Changelog

Version: 1.29b-2ubuntu0.4 2023-02-28 19:06:51 UTC

  tar (1.29b-2ubuntu0.4) bionic-security; urgency=medium

  * SECURITY UPDATE: one-byte out of bounds
    - debian/patches/CVE-2022-48303.patch: check limit in
      src/list.c.
    - CVE-2022-48303

 -- Leonidas Da Silva Barbosa <email address hidden> Wed, 15 Feb 2023 11:55:10 -0300

Source diff to previous version
CVE-2022-48303 GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the

Version: 1.29b-2ubuntu0.3 2022-03-15 18:06:59 UTC

  tar (1.29b-2ubuntu0.3) bionic-security; urgency=medium

  * SECURITY UPDATE: Denial of service (LP: #1912091)
    - debian/patches/CVE-2021-20193.patch: in read_header method in
      src/list.c, change the return value to be the value of status
      and break the execution, jumping to free next_long_name and
      next_long_link before returning.
    - CVE-2021-20193

 -- Rodrigo Figueiredo Zaiden <email address hidden> Tue, 15 Mar 2022 09:58:06 -0300

Source diff to previous version
1912091 Memory Leak GNU Tar 1.33
CVE-2021-20193 A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontro

Version: 1.29b-2ubuntu0.2 2021-01-13 19:07:19 UTC

  tar (1.29b-2ubuntu0.2) bionic-security; urgency=medium

  * SECURITY UPDATE: Infinite read loop
    - debian/patches/Fix-CVE-2018-20482.patch: Add handling for short read
      condition in sparse_dump_region() of src/sparse.c.
    - CVE-2018-20482
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2019-9923.patch: Check for NULL return value from
      find_next_block in src/sparse.c.
    - CVE-2019-9923

 -- Avital Ostromich <email address hidden> Tue, 15 Dec 2020 20:39:17 -0500

CVE-2018-20482 GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (inf
CVE-2019-9923 pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended header



About   -   Send Feedback to @ubuntu_updates