{"id":"CVE-2018-20482","details":"GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process (e.g., a system backup running as root).","modified":"2026-03-20T11:24:47.120356Z","published":"2018-12-26T18:29:00.373Z","related":["MGASA-2019-0034","SUSE-SU-2019:0926-1","SUSE-SU-2019:14215-1","SUSE-SU-2020:2806-1","SUSE-SU-2022:1548-1","openSUSE-SU-2019:1237-1","openSUSE-SU-2024:11422-1"],"references":[{"type":"ADVISORY","url":"http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00025.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/106354"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00023.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201903-05"},{"type":"FIX","url":"http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454"},{"type":"FIX","url":"https://twitter.com/thatcks/status/1076166645708668928"},{"type":"FIX","url":"https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug"},{"type":"EVIDENCE","url":"https://news.ycombinator.com/item?id=18745431"}],"affected":[{"ranges":[{"type":"GIT","repo":"http://git.savannah.gnu.org/git/tar.git/","events":[{"introduced":"0"},{"last_affected":"f8459cf8387cc2c7b3f1818a6379957fc23f5a21"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.30"}]}},{"type":"GIT","repo":"https://cgit.git.savannah.gnu.org/cgit/tar.git","events":[{"introduced":"0"},{"fixed":"c15c42ccd1e2377945fd0414eca1a49294bff454"}]}],"versions":["alpha_1_13_93","alpha_1_15_90","alpha_1_15_90_incremental_1","alpha_1_15_91","old","release_1_14","release_1_15","release_1_15_1","release_1_16","release_1_16_1","release_1_17","release_1_18","release_1_19","release_1_20","release_1_21","release_1_22","release_1_23","release_1_24","release_1_25","release_1_26","release_1_27","release_1_27_1","release_1_28","release_1_29","release_1_30"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-20482.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}