USN-3132-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-3132-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3132-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3132-1
Related
Published
2016-11-21T18:08:41.746659Z
Modified
2016-11-21T18:08:41.746659Z
Summary
tar vulnerability
Details

Harry Sintonen discovered that tar incorrectly handled extracting files when path names are specified on the command line. If a user or automated system were tricked into processing a specially crafted archive, an attacker could possibly overwrite arbitrary files.

References

Affected packages

Ubuntu:14.04:LTS / tar

Package

Name
tar
Purl
pkg:deb/ubuntu/tar@1.27.1-1ubuntu0.1?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.27.1-1ubuntu0.1

Affected versions

1.*

1.26+dfsg-8
1.27-3
1.27-4
1.27.1-1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "tar-scripts": "1.27.1-1ubuntu0.1",
            "tar": "1.27.1-1ubuntu0.1",
            "tar-dbgsym": "1.27.1-1ubuntu0.1"
        }
    ]
}

Ubuntu:16.04:LTS / tar

Package

Name
tar
Purl
pkg:deb/ubuntu/tar@1.28-2.1ubuntu0.1?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.28-2.1ubuntu0.1

Affected versions

1.*

1.27.1-2
1.28-2ubuntu1
1.28-2.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "tar-scripts": "1.28-2.1ubuntu0.1",
            "tar": "1.28-2.1ubuntu0.1",
            "tar-dbgsym": "1.28-2.1ubuntu0.1"
        }
    ]
}