UbuntuUpdates.org

Package "tar"

Name: tar

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • optional scripts for GNU version of the tar archiving utility

Latest version: 1.28-2.1ubuntu0.2
Release: xenial (16.04)
Level: updates
Repository: universe

Links



Other versions of "tar" in Xenial

Repository Area Version
base main 1.28-2.1
base universe 1.28-2.1
security main 1.28-2.1ubuntu0.2
security universe 1.28-2.1ubuntu0.2
updates main 1.28-2.1ubuntu0.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.28-2.1ubuntu0.2 2021-01-13 20:06:21 UTC

  tar (1.28-2.1ubuntu0.2) xenial-security; urgency=medium

  * SECURITY UPDATE: Infinite read loop
    - debian/patches/Fix-CVE-2018-20482.patch: Add handling for short read
      condition in sparse_dump_region() of src/sparse.c.
    - CVE-2018-20482
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2019-9923.patch: Check for NULL return value from
      find_next_block in src/sparse.c.
    - CVE-2019-9923

 -- Avital Ostromich <email address hidden> Wed, 16 Dec 2020 16:39:55 -0500

Source diff to previous version
CVE-2018-20482 GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (inf
CVE-2019-9923 pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended header

Version: 1.28-2.1ubuntu0.1 2016-11-21 20:06:50 UTC

  tar (1.28-2.1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: extract pathname bypass
    - debian/patches/CVE-2016-6321.patch: skip members whose names contain
      ".." in src/extract.c.
    - CVE-2016-6321

 -- Marc Deslauriers <email address hidden> Thu, 17 Nov 2016 11:06:07 -0500

CVE-2016-6321 Bypassing the extract path name



About   -   Send Feedback to @ubuntu_updates