First published: Mon Dec 11 2023(Updated: )
It was discovered that tar incorrectly handled extended attributes in PAX archives. An attacker could use this issue to cause tar to crash, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/tar | <1.34+dfsg-1.2ubuntu1.1 | 1.34+dfsg-1.2ubuntu1.1 |
=23.10 | ||
All of | ||
ubuntu/tar | <1.34+dfsg-1.2ubuntu0.2 | 1.34+dfsg-1.2ubuntu0.2 |
=23.04 | ||
All of | ||
ubuntu/tar | <1.34+dfsg-1ubuntu0.1.22.04.2 | 1.34+dfsg-1ubuntu0.1.22.04.2 |
=22.04 | ||
All of | ||
ubuntu/tar | <1.30+dfsg-7ubuntu0.20.04.4 | 1.30+dfsg-7ubuntu0.20.04.4 |
=20.04 | ||
All of | ||
ubuntu/tar | <1.29b-2ubuntu0.4+esm1 | 1.29b-2ubuntu0.4+esm1 |
=18.04 | ||
All of | ||
ubuntu/tar | <1.28-2.1ubuntu0.2+esm3 | 1.28-2.1ubuntu0.2+esm3 |
=16.04 | ||
All of | ||
ubuntu/tar | <1.27.1-1ubuntu0.1+esm4 | 1.27.1-1ubuntu0.1+esm4 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6543-1 is not specified.
The affected software for USN-6543-1 is the tar package on various versions of Ubuntu.
The vulnerability in USN-6543-1 could allow an attacker to crash the tar program, resulting in a denial of service.
To fix the vulnerability in USN-6543-1, update the tar package to the recommended version provided by Ubuntu.
More information about USN-6543-1 can be found at the following references: [CVE-2023-39804](https://ubuntu.com/security/CVE-2023-39804), [Ubuntu Security Notice](https://launchpad.net/ubuntu/+source/tar/1.34+dfsg-1.2ubuntu1.1), [Ubuntu Launchpad](https://launchpad.net/ubuntu/+source/tar/1.34+dfsg-1.2ubuntu0.2)