First published: Wed Dec 26 2018(Updated: )
GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process (e.g., a system backup running as root).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU tar | <=1.30 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-20482 is medium with a CVSS severity score of 4.7.
CVE-2018-20482 affects GNU Tar versions up to and including 1.30 when the --sparse option is used.
CVE-2018-20482 impacts Debian Debian Linux 8.0.
A local user can exploit CVE-2018-20482 by modifying a file that is supposed to be archived by a different user's process, causing a denial of service with an infinite read loop in sparse_dump_region in sparse.c.
Yes, fixes are available for CVE-2018-20482. It is recommended to update GNU Tar to a version higher than 1.30.