UbuntuUpdates.org

Package "tar"

Name: tar

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • optional scripts for GNU version of the tar archiving utility

Latest version: 1.29b-2ubuntu0.4
Release: bionic (18.04)
Level: updates
Repository: universe

Links



Other versions of "tar" in Bionic

Repository Area Version
base main 1.29b-2
base universe 1.29b-2
security universe 1.29b-2ubuntu0.4
security main 1.29b-2ubuntu0.4
updates main 1.29b-2ubuntu0.4

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.29b-2ubuntu0.4 2023-02-28 21:06:54 UTC

  tar (1.29b-2ubuntu0.4) bionic-security; urgency=medium

  * SECURITY UPDATE: one-byte out of bounds
    - debian/patches/CVE-2022-48303.patch: check limit in
      src/list.c.
    - CVE-2022-48303

 -- Leonidas Da Silva Barbosa <email address hidden> Wed, 15 Feb 2023 11:55:10 -0300

Source diff to previous version
CVE-2022-48303 GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the

Version: 1.29b-2ubuntu0.3 2022-03-15 20:07:23 UTC

  tar (1.29b-2ubuntu0.3) bionic-security; urgency=medium

  * SECURITY UPDATE: Denial of service (LP: #1912091)
    - debian/patches/CVE-2021-20193.patch: in read_header method in
      src/list.c, change the return value to be the value of status
      and break the execution, jumping to free next_long_name and
      next_long_link before returning.
    - CVE-2021-20193

 -- Rodrigo Figueiredo Zaiden <email address hidden> Tue, 15 Mar 2022 09:58:06 -0300

Source diff to previous version
1912091 Memory Leak GNU Tar 1.33
CVE-2021-20193 A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontro

Version: 1.29b-2ubuntu0.2 2021-01-13 20:06:27 UTC

  tar (1.29b-2ubuntu0.2) bionic-security; urgency=medium

  * SECURITY UPDATE: Infinite read loop
    - debian/patches/Fix-CVE-2018-20482.patch: Add handling for short read
      condition in sparse_dump_region() of src/sparse.c.
    - CVE-2018-20482
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2019-9923.patch: Check for NULL return value from
      find_next_block in src/sparse.c.
    - CVE-2019-9923

 -- Avital Ostromich <email address hidden> Tue, 15 Dec 2020 20:39:17 -0500

Source diff to previous version
CVE-2018-20482 GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (inf
CVE-2019-9923 pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended header

Version: 1.29b-2ubuntu0.1 2019-01-30 19:07:01 UTC

  tar (1.29b-2ubuntu0.1) bionic; urgency=medium

  * debian/patches/git_add_file.patch:
    - backport "Fix the --add-file option." upstream commit,
      thanks Martin Vogt (lp: #1809827)

 -- Sebastien Bacher <email address hidden> Mon, 21 Jan 2019 17:38:11 +0100

1809827 --add-file broken in bionic



About   -   Send Feedback to @ubuntu_updates