==========================================================================
Ubuntu Security Notice USN-4692-1
January 13, 2021
tar vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 20.10
– Ubuntu 20.04 LTS
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in tar.
Software Description:
– tar: GNU version of the tar archiving utility
Details:
Chris Siebenmann discovered that tar incorrectly handled extracting files
resized during extraction when invoked with the –sparse flag. An attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM, Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2018-20482)
Daniel Axtens discovered that tar incorrectly handled certain malformed
tar files. If a user or automated system were tricked into processing a
specially crafted tar archive, a remote attacker could use this issue to
cause tar to crash, resulting in a denial of service. (CVE-2019-9923)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.10:
  tar                             1.30+dfsg-7ubuntu0.20.10.1
Ubuntu 20.04 LTS:
  tar                             1.30+dfsg-7ubuntu0.20.04.1
Ubuntu 18.04 LTS:
  tar                             1.29b-2ubuntu0.2
Ubuntu 16.04 LTS:
  tar                             1.28-2.1ubuntu0.2
Ubuntu 14.04 ESM:
  tar                             1.27.1-1ubuntu0.1+esm1
Ubuntu 12.04 ESM:
  tar                             1.26-4ubuntu1.2
In general, a standard system update will make all the necessary changes.
References:
  https://usn.ubuntu.com/4692-1
  CVE-2018-20482, CVE-2019-9923
Package Information:
  https://launchpad.net/ubuntu/+source/tar/1.30+dfsg-7ubuntu0.20.10.1
  https://launchpad.net/ubuntu/+source/tar/1.30+dfsg-7ubuntu0.20.04.1
  https://launchpad.net/ubuntu/+source/tar/1.29b-2ubuntu0.2
  https://launchpad.net/ubuntu/+source/tar/1.28-2.1ubuntu0.2
<html>
  <head>
    <meta http-equiv=”content-type” content=”text/html; charset=UTF-8″>
  </head>
  <body>
    <p>
    </p>
    <div class=”moz-text-plain” wrap=”true” style=”font-family:
      -moz-fixed; font-size: 12px;” lang=”x-unicode”>
      <pre class=”moz-quote-pre” wrap=””>==========================================================================
Ubuntu Security Notice USN-4692-1
January 13, 2021
tar vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 20.10
– Ubuntu 20.04 LTS
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in tar.
Software Description:
– tar: GNU version of the tar archiving utility
Details:
Chris Siebenmann discovered that tar incorrectly handled extracting files
resized during extraction when invoked with the –sparse flag. An attacker
could possibly use this issue to cause a denial of service. This issue
only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM, Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS. (CVE-2018-20482)
Daniel Axtens discovered that tar incorrectly handled certain malformed
tar files. If a user or automated system were tricked into processing a
specially crafted tar archive, a remote attacker could use this issue to
cause tar to crash, resulting in a denial of service. (CVE-2019-9923)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.10:
  tar                             1.30+dfsg-7ubuntu0.20.10.1
Ubuntu 20.04 LTS:
  tar                             1.30+dfsg-7ubuntu0.20.04.1
Ubuntu 18.04 LTS:
  tar                             1.29b-2ubuntu0.2
Ubuntu 16.04 LTS:
  tar                             1.28-2.1ubuntu0.2
Ubuntu 14.04 ESM:
  tar                             1.27.1-1ubuntu0.1+esm1
Ubuntu 12.04 ESM:
  tar                             1.26-4ubuntu1.2
In general, a standard system update will make all the necessary changes.
References:
  <a class=”moz-txt-link-freetext” href=”https://usn.ubuntu.com/4692-1″>https://usn.ubuntu.com/4692-1</a>
  CVE-2018-20482, CVE-2019-9923
Package Information:
  <a class=”moz-txt-link-freetext” href=”https://launchpad.net/ubuntu/+source/tar/1.30+dfsg-7ubuntu0.20.10.1″>https://launchpad.net/ubuntu/+source/tar/1.30+dfsg-7ubuntu0.20.10.1</a>
  <a class=”moz-txt-link-freetext” href=”https://launchpad.net/ubuntu/+source/tar/1.30+dfsg-7ubuntu0.20.04.1″>https://launchpad.net/ubuntu/+source/tar/1.30+dfsg-7ubuntu0.20.04.1</a>
  <a class=”moz-txt-link-freetext” href=”https://launchpad.net/ubuntu/+source/tar/1.29b-2ubuntu0.2″>https://launchpad.net/ubuntu/+source/tar/1.29b-2ubuntu0.2</a>
  <a class=”moz-txt-link-freetext” href=”https://launchpad.net/ubuntu/+source/tar/1.28-2.1ubuntu0.2″>https://launchpad.net/ubuntu/+source/tar/1.28-2.1ubuntu0.2</a>
</pre>
    </div>
  </body>
</html>
—–BEGIN PGP SIGNATURE—–
iQEzBAEBCAAdFiEElnO/d49FoUPK9fwytGdj0GOh2+wFAl//aEwACgkQtGdj0GOh
2+wPTAf+KM7KAP0N60Jvz1HLGDeFIIYVkWeLzFFSDdVUBrnS/IaOd4TjG5H/hPFM
aKW7169QPKAC5arQWMLB1a0f3iqAKDTNR5AJUZT5qBIz+O2C/aBmj4V/swsLIX/W
5uQSMesU/X76mk4DvxJLrvNBH1o5DPWDCnocohZrgawxzxQQMrBnYSGRlxyCf253
VcOQPg0HHmFDREiHR/5xMo21T7DXk/F+eIAVAymr5+wxetuEHpMeR7YZUtbdWOWu
1tAtZQI5bVpHtuxSgnOAGLro54QXHSarn6td7qBmpx97mPcvvpoa52JJWXazY1T4
IbEpfH8B+1hiPHwJT58/8SOeqbrkug==
=aPqd
—–END PGP SIGNATURE—–
—



