SUSE-SU-2019:14215-1: moderate: Security update for tar
    sle-updates at lists.suse.com 
    sle-updates at lists.suse.com
       
    Mon Nov 11 13:11:02 MST 2019
    
    
  
   SUSE Security Update: Security update for tar
______________________________________________________________________________
Announcement ID:    SUSE-SU-2019:14215-1
Rating:             moderate
References:         #1120610 #1130496 #1152736 
Cross-References:   CVE-2018-20482 CVE-2019-9923
Affected Products:
                    SUSE Linux Enterprise Server 11-SP4-LTSS
                    SUSE Linux Enterprise Point of Sale 11-SP3
                    SUSE Linux Enterprise Debuginfo 11-SP4
                    SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
   An update that solves two vulnerabilities and has one
   errata is now available.
Description:
   This update for tar to version 1.27.1 fixes the following issues:
   tar 1.27.1 brings following changes (jsc#ECO-339)
   * Sparse files with large data
   * No backticks in quoting
   * --owner and --group names and numbers
   * Support for POSIX ACLs, extended attributes and SELinux context.
   * Passing command line arguments to external commands.
   * New configure option --enable-gcc-warnings, intended for debugging.
   * New warning control option --warning=[no-]record-size
   * New command line option --keep-directory-symlink
   * Fix unquoting of file names obtained via the -T option.
   * Fix GNU long link header timestamp (backward compatibility).
   Security issues fixed:
   - CVE-2019-9923: Fixed a denial of service while parsing certain archives
     with malformed extended headers in pax_decode_header() (bsc#1130496).
   - CVE-2018-20482: Fixed a denial of service when the '--sparse' option
     mishandles file shrinkage during read access (bsc#1120610).
Patch Instructions:
   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".
   Alternatively you can run the command listed for your product:
   - SUSE Linux Enterprise Server 11-SP4-LTSS:
      zypper in -t patch slessp4-tar-14215=1
   - SUSE Linux Enterprise Point of Sale 11-SP3:
      zypper in -t patch sleposp3-tar-14215=1
   - SUSE Linux Enterprise Debuginfo 11-SP4:
      zypper in -t patch dbgsp4-tar-14215=1
   - SUSE Linux Enterprise Debuginfo 11-SP3:
      zypper in -t patch dbgsp3-tar-14215=1
Package List:
   - SUSE Linux Enterprise Server 11-SP4-LTSS (i586 ppc64 s390x x86_64):
      tar-1.27.1-14.8.1
   - SUSE Linux Enterprise Point of Sale 11-SP3 (i586):
      tar-1.27.1-14.8.1
   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ppc64 s390x x86_64):
      tar-debuginfo-1.27.1-14.8.1
      tar-debugsource-1.27.1-14.8.1
   - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64):
      tar-debuginfo-1.27.1-14.8.1
      tar-debugsource-1.27.1-14.8.1
References:
   https://www.suse.com/security/cve/CVE-2018-20482.html
   https://www.suse.com/security/cve/CVE-2019-9923.html
   https://bugzilla.suse.com/1120610
   https://bugzilla.suse.com/1130496
   https://bugzilla.suse.com/1152736
    
    
More information about the sle-updates
mailing list