CVE-2018-20482
Published: 26 December 2018
GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process (e.g., a system backup running as root).
Priority
CVSS 3 base score: 4.7
Status
Package | Release | Status |
---|---|---|
tar Launchpad, Ubuntu, Debian |
Upstream |
Released
(1.30+dfsg-3.1)
|
Ubuntu 21.04 (Hirsute Hippo) |
Not vulnerable
(1.30+dfsg-6)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(1.30+dfsg-6)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(1.30+dfsg-6)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1.29b-2ubuntu0.2)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1.28-2.1ubuntu0.2)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(1.27.1-1ubuntu0.1+esm1)
|
|
Patches: Upstream: http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42c |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20482
- https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug
- https://news.ycombinator.com/item?id=18745431
- https://twitter.com/thatcks/status/1076166645708668928
- http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html
- https://usn.ubuntu.com/usn/usn-4692-1
- NVD
- Launchpad
- Debian