SUSE-SU-2019:14215-1: moderate: Security update for tar

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon Nov 11 13:11:03 MST 2019


   SUSE Security Update: Security update for tar
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:14215-1
Rating:             moderate
References:         #1120610 #1130496 #1152736 
Cross-References:   CVE-2018-20482 CVE-2019-9923
Affected Products:
                    SUSE Linux Enterprise Server 11-SP4-LTSS
                    SUSE Linux Enterprise Point of Sale 11-SP3
                    SUSE Linux Enterprise Debuginfo 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________

   An update that solves two vulnerabilities and has one
   errata is now available.

Description:

   This update for tar to version 1.27.1 fixes the following issues:

   tar 1.27.1 brings following changes (jsc#ECO-339)

   * Sparse files with large data
   * No backticks in quoting
   * --owner and --group names and numbers
   * Support for POSIX ACLs, extended attributes and SELinux context.
   * Passing command line arguments to external commands.
   * New configure option --enable-gcc-warnings, intended for debugging.
   * New warning control option --warning=[no-]record-size
   * New command line option --keep-directory-symlink
   * Fix unquoting of file names obtained via the -T option.
   * Fix GNU long link header timestamp (backward compatibility).

   Security issues fixed:

   - CVE-2019-9923: Fixed a denial of service while parsing certain archives
     with malformed extended headers in pax_decode_header() (bsc#1130496).
   - CVE-2018-20482: Fixed a denial of service when the '--sparse' option
     mishandles file shrinkage during read access (bsc#1120610).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP4-LTSS:

      zypper in -t patch slessp4-tar-14215=1

   - SUSE Linux Enterprise Point of Sale 11-SP3:

      zypper in -t patch sleposp3-tar-14215=1

   - SUSE Linux Enterprise Debuginfo 11-SP4:

      zypper in -t patch dbgsp4-tar-14215=1

   - SUSE Linux Enterprise Debuginfo 11-SP3:

      zypper in -t patch dbgsp3-tar-14215=1



Package List:

   - SUSE Linux Enterprise Server 11-SP4-LTSS (i586 ppc64 s390x x86_64):

      tar-1.27.1-14.8.1

   - SUSE Linux Enterprise Point of Sale 11-SP3 (i586):

      tar-1.27.1-14.8.1

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ppc64 s390x x86_64):

      tar-debuginfo-1.27.1-14.8.1
      tar-debugsource-1.27.1-14.8.1

   - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):

      tar-debuginfo-1.27.1-14.8.1
      tar-debugsource-1.27.1-14.8.1


References:

   https://www.suse.com/security/cve/CVE-2018-20482.html
   https://www.suse.com/security/cve/CVE-2019-9923.html
   https://bugzilla.suse.com/1120610
   https://bugzilla.suse.com/1130496
   https://bugzilla.suse.com/1152736



More information about the sle-security-updates mailing list