Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 674210 (CVE-2018-20482) - <app-arch/tar-1.30-r1: mishandles file shrinkage during read access
Summary: <app-arch/tar-1.30-r1: mishandles file shrinkage during read access
Status: RESOLVED FIXED
Alias: CVE-2018-20482
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: http://lists.gnu.org/archive/html/bug...
Whiteboard: A3 [glsa+ cve]
Keywords:
Depends on: 675140
Blocks:
  Show dependency tree
 
Reported: 2018-12-31 23:31 UTC by D'juan McDonald (domhnall)
Modified: 2019-03-10 20:05 UTC (History)
1 user (show)

See Also:
Package list:
app-arch/tar-1.31-r1
Runtime testing required: ---
stable-bot: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description D'juan McDonald (domhnall) 2018-12-31 23:31:52 UTC
(https://nvd.nist.gov/vuln/detail/CVE-2018-20482):

GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process (e.g., a system backup running as root).

Upstream Patch: http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42c
Comment 1 Larry the Git Cow gentoo-dev 2019-01-01 14:38:09 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=a3a8c469b2bb96d3ee3a4fa99bb5b30aa38c7589

commit a3a8c469b2bb96d3ee3a4fa99bb5b30aa38c7589
Author:     Lars Wendler <polynomial-c@gentoo.org>
AuthorDate: 2019-01-01 14:36:33 +0000
Commit:     Lars Wendler <polynomial-c@gentoo.org>
CommitDate: 2019-01-01 14:38:01 +0000

    app-arch/tar: Revbump to fix CVE-2018-20482
    
    Patch added without new test suite because that would require
    an eautoreconf run.
    
    Bug: https://bugs.gentoo.org/674210
    Package-Manager: Portage-2.3.53, Repoman-2.3.12
    Signed-off-by: Lars Wendler <polynomial-c@gentoo.org>

 app-arch/tar/files/tar-1.30-CVE-2018-20482.patch | 146 +++++++++++++++++++++++
 app-arch/tar/tar-1.30-r1.ebuild                  |  82 +++++++++++++
 2 files changed, 228 insertions(+)
Comment 2 Thomas Deutschmann gentoo-dev Security 2019-01-03 20:31:34 UTC
Let's go with =app-arch/tar-1.31 which has additional buffer overflow fixes.


@ arches,

please test and mark stable: =app-arch/tar-1.31
Comment 3 Thomas Deutschmann gentoo-dev Security 2019-01-04 00:03:14 UTC
x86 stable
Comment 4 Mikle Kolyada archtester Gentoo Infrastructure gentoo-dev Security 2019-01-04 10:38:05 UTC
amd64 stable
Comment 5 Rolf Eike Beer archtester 2019-01-05 19:48:23 UTC
sparc stable
Comment 6 Sergei Trofimovich (RETIRED) gentoo-dev 2019-01-05 22:48:01 UTC
ia64/ppc/ppc64 stable
Comment 7 Mart Raudsepp gentoo-dev 2019-01-06 22:27:14 UTC
arm64 stable
Comment 8 Matt Turner gentoo-dev 2019-01-22 07:15:58 UTC
alpha stable
Comment 9 Markus Meier gentoo-dev 2019-01-30 18:49:43 UTC
arm stable
Comment 10 Mikle Kolyada archtester Gentoo Infrastructure gentoo-dev Security 2019-02-12 09:14:48 UTC
s390 stable
Comment 11 Mikle Kolyada archtester Gentoo Infrastructure gentoo-dev Security 2019-02-12 09:15:40 UTC
sh stable
Comment 12 Mikle Kolyada archtester Gentoo Infrastructure gentoo-dev Security 2019-02-12 09:16:34 UTC
m68k stable
Comment 13 Mikle Kolyada archtester Gentoo Infrastructure gentoo-dev Security 2019-03-10 16:12:49 UTC
hppa stable
Comment 14 GLSAMaker/CVETool Bot gentoo-dev 2019-03-10 20:05:37 UTC
This issue was resolved and addressed in
 GLSA 201903-05 at https://security.gentoo.org/glsa/201903-05
by GLSA coordinator Aaron Bauman (b-man).