(https://nvd.nist.gov/vuln/detail/CVE-2018-20482): GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process (e.g., a system backup running as root). Upstream Patch: http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42c
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=a3a8c469b2bb96d3ee3a4fa99bb5b30aa38c7589 commit a3a8c469b2bb96d3ee3a4fa99bb5b30aa38c7589 Author: Lars Wendler <polynomial-c@gentoo.org> AuthorDate: 2019-01-01 14:36:33 +0000 Commit: Lars Wendler <polynomial-c@gentoo.org> CommitDate: 2019-01-01 14:38:01 +0000 app-arch/tar: Revbump to fix CVE-2018-20482 Patch added without new test suite because that would require an eautoreconf run. Bug: https://bugs.gentoo.org/674210 Package-Manager: Portage-2.3.53, Repoman-2.3.12 Signed-off-by: Lars Wendler <polynomial-c@gentoo.org> app-arch/tar/files/tar-1.30-CVE-2018-20482.patch | 146 +++++++++++++++++++++++ app-arch/tar/tar-1.30-r1.ebuild | 82 +++++++++++++ 2 files changed, 228 insertions(+)
Let's go with =app-arch/tar-1.31 which has additional buffer overflow fixes. @ arches, please test and mark stable: =app-arch/tar-1.31
x86 stable
amd64 stable
sparc stable
ia64/ppc/ppc64 stable
arm64 stable
alpha stable
arm stable
s390 stable
sh stable
m68k stable
hppa stable
This issue was resolved and addressed in GLSA 201903-05 at https://security.gentoo.org/glsa/201903-05 by GLSA coordinator Aaron Bauman (b-man).