[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1623-1] tar security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : tar
Version        : 1.27.1-2+deb8u2
CVE ID         : CVE-2018-20482
Debian Bug     : #917377

It was discovered that there was a potential denial of service
vulnerability in tar, the GNU version of the tar UNIX archiving
utility.

The --sparse argument looped endlessly if the file shrank whilst
it was being read. Tar would only break out of this endless loop
if the file grew again to (or beyond) its original end of file.

For Debian 8 "Jessie", this issue has been fixed in tar version
1.27.1-2+deb8u2.

We recommend that you upgrade your tar packages.


Regards,

- -- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

-----BEGIN PGP SIGNATURE-----
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=shbh
-----END PGP SIGNATURE-----


Reply to: