Lucene search

K
openvasCopyright (C) 2022 Greenbone AGOPENVAS:13614125623114202215481
HistoryMay 06, 2022 - 12:00 a.m.

SUSE: Security Advisory (SUSE-SU-2022:1548-1)

2022-05-0600:00:00
Copyright (C) 2022 Greenbone AG
plugins.openvas.org
1

5.9 Medium

AI Score

Confidence

High

0.011 Low

EPSS

Percentile

84.3%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2022 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.1.4.2022.1548.1");
  script_cve_id("CVE-2018-20482", "CVE-2019-9923", "CVE-2021-20193");
  script_tag(name:"creation_date", value:"2022-05-06 04:15:11 +0000 (Fri, 06 May 2022)");
  script_version("2024-02-02T14:37:51+0000");
  script_tag(name:"last_modification", value:"2024-02-02 14:37:51 +0000 (Fri, 02 Feb 2024)");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2019-03-25 16:52:47 +0000 (Mon, 25 Mar 2019)");

  script_name("SUSE: Security Advisory (SUSE-SU-2022:1548-1)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2022 Greenbone AG");
  script_family("SuSE Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/suse_sles", "ssh/login/rpms", re:"ssh/login/release=(SLES15\.0SP3)");

  script_xref(name:"Advisory-ID", value:"SUSE-SU-2022:1548-1");
  script_xref(name:"URL", value:"https://www.suse.com/support/update/announcement/2022/suse-su-20221548-1/");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'tar' package(s) announced via the SUSE-SU-2022:1548-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"This update for tar fixes the following issues:

CVE-2021-20193: Fixed a memory leak in read_header() in list.c
 (bsc#1181131).

CVE-2019-9923: Fixed a null-pointer dereference in pax_decode_header in
 sparse.c (bsc#1130496).

CVE-2018-20482: Fixed infinite read loop in sparse_dump_region in
 sparse.c (bsc#1120610).

Update to GNU tar 1.34:
 * Fix extraction over pipe
 * Fix memory leak in read_header (CVE-2021-20193) (bsc#1181131)
 * Fix extraction when . and .. are unreadable
 * Gracefully handle duplicate symlinks when extracting
 * Re-initialize supplementary groups when switching to user privileges

Update to GNU tar 1.33:
 * POSIX extended format headers do not include PID by default
 * --delay-directory-restore works for archives with reversed member
 ordering
 * Fix extraction of a symbolic link hardlinked to another symbolic link
 * Wildcards in exclude-vcs-ignore mode don't match slash
 * Fix the --no-overwrite-dir option
 * Fix handling of chained renames in incremental backups
 * Link counting works for file names supplied with -T
 * Accept only position-sensitive (file-selection) options in file list
 files

prepare usrmerge (bsc#1029961)

Update to GNU 1.32
 * Fix the use of --checkpoint without explicit --checkpoint-action
 * Fix extraction with the -U option
 * Fix iconv usage on BSD-based systems
 * Fix possible NULL dereference (savannah bug #55369) [bsc#1130496]
 [CVE-2019-9923]
 * Improve the testsuite

Update to GNU 1.31
 * Fix heap-buffer-overrun with --one-top-level, bug introduced with the
 addition of that option in 1.28
 * Support for zstd compression
 * New option '--zstd' instructs tar to use zstd as compression program.
 When listing, extractng and comparing, zstd compressed archives are
 recognized automatically. When '-a' option is in effect, zstd
 compression is selected if the destination archive name ends in '.zst'
 or '.tzst'.
 * The -K option interacts properly with member names given in the
 command line. Names of members to extract can be specified along with
 the '-K NAME' option. In this case, tar will extract NAME and those of
 named members that appear in the archive after it, which is consistent
 with the semantics of the option. Previous versions of tar extracted
 NAME, those of named members that appeared before it, and everything
 after it.
 * Fix CVE-2018-20482 - When creating archives with the --sparse
 option, previous versions of tar would loop endlessly if a sparse file
 had been truncated while being archived.");

  script_tag(name:"affected", value:"'tar' package(s) on SUSE Linux Enterprise Micro 5.0, SUSE Linux Enterprise Micro 5.1, SUSE Linux Enterprise Micro 5.2, SUSE Linux Enterprise Module for Basesystem 15-SP3, SUSE Linux Enterprise Realtime Extension 15-SP2.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "SLES15.0SP3") {

  if(!isnull(res = isrpmvuln(pkg:"tar", rpm:"tar~1.34~150000.3.12.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"tar-debuginfo", rpm:"tar-debuginfo~1.34~150000.3.12.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"tar-debugsource", rpm:"tar-debugsource~1.34~150000.3.12.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"tar-lang", rpm:"tar-lang~1.34~150000.3.12.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"tar-rmt", rpm:"tar-rmt~1.34~150000.3.12.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"tar-rmt-debuginfo", rpm:"tar-rmt-debuginfo~1.34~150000.3.12.1", rls:"SLES15.0SP3"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);