==========================================================================
Ubuntu Security Notice USN-4692-1
January 13, 2021
tar vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 20.10
– Ubuntu 20.04 LTS
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in tar.
Software Description:
– tar: GNU version of the tar archiving utility
Details:
Chris Siebenmann discovered that tar incorrectly handled extracting files
resized during extraction when invoked with the –sparse flag. An attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM, Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2018-20482)
Daniel Axtens discovered that tar incorrectly handled certain malformed
tar files. If a user or automated system were tricked into processing a
specially crafted tar archive, a remote attacker could use this issue to
cause tar to crash, resulting in a denial of service. (CVE-2019-9923)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.10:
tar 1.30+dfsg-7ubuntu0.20.10.1
Ubuntu 20.04 LTS:
tar 1.30+dfsg-7ubuntu0.20.04.1
Ubuntu 18.04 LTS:
tar 1.29b-2ubuntu0.2
Ubuntu 16.04 LTS:
tar 1.28-2.1ubuntu0.2
Ubuntu 14.04 ESM:
tar 1.27.1-1ubuntu0.1+esm1
Ubuntu 12.04 ESM:
tar 1.26-4ubuntu1.2
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4692-1
CVE-2018-20482, CVE-2019-9923
Package Information:
https://launchpad.net/ubuntu/+source/tar/1.30+dfsg-7ubuntu0.20.10.1
https://launchpad.net/ubuntu/+source/tar/1.30+dfsg-7ubuntu0.20.04.1
https://launchpad.net/ubuntu/+source/tar/1.29b-2ubuntu0.2
https://launchpad.net/ubuntu/+source/tar/1.28-2.1ubuntu0.2
<html>
<head>
<meta http-equiv=”content-type” content=”text/html; charset=UTF-8″>
</head>
<body>
<p>
</p>
<div class=”moz-text-plain” wrap=”true” style=”font-family:
-moz-fixed; font-size: 12px;” lang=”x-unicode”>
<pre class=”moz-quote-pre” wrap=””>==========================================================================
Ubuntu Security Notice USN-4692-1
January 13, 2021
tar vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 20.10
– Ubuntu 20.04 LTS
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in tar.
Software Description:
– tar: GNU version of the tar archiving utility
Details:
Chris Siebenmann discovered that tar incorrectly handled extracting files
resized during extraction when invoked with the –sparse flag. An attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM, Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2018-20482)
Daniel Axtens discovered that tar incorrectly handled certain malformed
tar files. If a user or automated system were tricked into processing a
specially crafted tar archive, a remote attacker could use this issue to
cause tar to crash, resulting in a denial of service. (CVE-2019-9923)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.10:
tar 1.30+dfsg-7ubuntu0.20.10.1
Ubuntu 20.04 LTS:
tar 1.30+dfsg-7ubuntu0.20.04.1
Ubuntu 18.04 LTS:
tar 1.29b-2ubuntu0.2
Ubuntu 16.04 LTS:
tar 1.28-2.1ubuntu0.2
Ubuntu 14.04 ESM:
tar 1.27.1-1ubuntu0.1+esm1
Ubuntu 12.04 ESM:
tar 1.26-4ubuntu1.2
In general, a standard system update will make all the necessary changes.
References:
<a class=”moz-txt-link-freetext” href=”https://usn.ubuntu.com/4692-1″>https://usn.ubuntu.com/4692-1</a>
CVE-2018-20482, CVE-2019-9923
Package Information:
<a class=”moz-txt-link-freetext” href=”https://launchpad.net/ubuntu/+source/tar/1.30+dfsg-7ubuntu0.20.10.1″>https://launchpad.net/ubuntu/+source/tar/1.30+dfsg-7ubuntu0.20.10.1</a>
<a class=”moz-txt-link-freetext” href=”https://launchpad.net/ubuntu/+source/tar/1.30+dfsg-7ubuntu0.20.04.1″>https://launchpad.net/ubuntu/+source/tar/1.30+dfsg-7ubuntu0.20.04.1</a>
<a class=”moz-txt-link-freetext” href=”https://launchpad.net/ubuntu/+source/tar/1.29b-2ubuntu0.2″>https://launchpad.net/ubuntu/+source/tar/1.29b-2ubuntu0.2</a>
<a class=”moz-txt-link-freetext” href=”https://launchpad.net/ubuntu/+source/tar/1.28-2.1ubuntu0.2″>https://launchpad.net/ubuntu/+source/tar/1.28-2.1ubuntu0.2</a>
</pre>
</div>
</body>
</html>
—–BEGIN PGP SIGNATURE—–
iQEzBAEBCAAdFiEElnO/d49FoUPK9fwytGdj0GOh2+wFAl//aEwACgkQtGdj0GOh
2+wPTAf+KM7KAP0N60Jvz1HLGDeFIIYVkWeLzFFSDdVUBrnS/IaOd4TjG5H/hPFM
aKW7169QPKAC5arQWMLB1a0f3iqAKDTNR5AJUZT5qBIz+O2C/aBmj4V/swsLIX/W
5uQSMesU/X76mk4DvxJLrvNBH1o5DPWDCnocohZrgawxzxQQMrBnYSGRlxyCf253
VcOQPg0HHmFDREiHR/5xMo21T7DXk/F+eIAVAymr5+wxetuEHpMeR7YZUtbdWOWu
1tAtZQI5bVpHtuxSgnOAGLro54QXHSarn6td7qBmpx97mPcvvpoa52JJWXazY1T4
IbEpfH8B+1hiPHwJT58/8SOeqbrkug==
=aPqd
—–END PGP SIGNATURE—–
—