{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"tar-1.34-2.2 on GA media","title":"Title of the patch"},{"category":"description","text":"These are all security issues fixed in the tar-1.34-2.2 package on the GA media of openSUSE Tumbleweed.","title":"Description of the patch"},{"category":"details","text":"openSUSE-Tumbleweed-2024-11422","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11422-1.json"},{"category":"self","summary":"SUSE CVE CVE-2001-1267 page","url":"https://www.suse.com/security/cve/CVE-2001-1267/"},{"category":"self","summary":"SUSE CVE CVE-2002-0399 page","url":"https://www.suse.com/security/cve/CVE-2002-0399/"},{"category":"self","summary":"SUSE CVE CVE-2005-1918 page","url":"https://www.suse.com/security/cve/CVE-2005-1918/"},{"category":"self","summary":"SUSE CVE CVE-2006-0300 page","url":"https://www.suse.com/security/cve/CVE-2006-0300/"},{"category":"self","summary":"SUSE CVE CVE-2006-6097 page","url":"https://www.suse.com/security/cve/CVE-2006-6097/"},{"category":"self","summary":"SUSE CVE CVE-2018-20482 page","url":"https://www.suse.com/security/cve/CVE-2018-20482/"},{"category":"self","summary":"SUSE CVE CVE-2019-9923 page","url":"https://www.suse.com/security/cve/CVE-2019-9923/"}],"title":"tar-1.34-2.2 on GA media","tracking":{"current_release_date":"2024-06-15T00:00:00Z","generator":{"date":"2024-06-15T00:00:00Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2024:11422-1","initial_release_date":"2024-06-15T00:00:00Z","revision_history":[{"date":"2024-06-15T00:00:00Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"tar-1.34-2.2.aarch64","product":{"name":"tar-1.34-2.2.aarch64","product_id":"tar-1.34-2.2.aarch64"}},{"category":"product_version","name":"tar-backup-scripts-1.34-2.2.aarch64","product":{"name":"tar-backup-scripts-1.34-2.2.aarch64","product_id":"tar-backup-scripts-1.34-2.2.aarch64"}},{"category":"product_version","name":"tar-doc-1.34-2.2.aarch64","product":{"name":"tar-doc-1.34-2.2.aarch64","product_id":"tar-doc-1.34-2.2.aarch64"}},{"category":"product_version","name":"tar-lang-1.34-2.2.aarch64","product":{"name":"tar-lang-1.34-2.2.aarch64","product_id":"tar-lang-1.34-2.2.aarch64"}},{"category":"product_version","name":"tar-rmt-1.34-2.2.aarch64","product":{"name":"tar-rmt-1.34-2.2.aarch64","product_id":"tar-rmt-1.34-2.2.aarch64"}},{"category":"product_version","name":"tar-tests-1.34-2.2.aarch64","product":{"name":"tar-tests-1.34-2.2.aarch64","product_id":"tar-tests-1.34-2.2.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"tar-1.34-2.2.ppc64le","product":{"name":"tar-1.34-2.2.ppc64le","product_id":"tar-1.34-2.2.ppc64le"}},{"category":"product_version","name":"tar-backup-scripts-1.34-2.2.ppc64le","product":{"name":"tar-backup-scripts-1.34-2.2.ppc64le","product_id":"tar-backup-scripts-1.34-2.2.ppc64le"}},{"category":"product_version","name":"tar-doc-1.34-2.2.ppc64le","product":{"name":"tar-doc-1.34-2.2.ppc64le","product_id":"tar-doc-1.34-2.2.ppc64le"}},{"category":"product_version","name":"tar-lang-1.34-2.2.ppc64le","product":{"name":"tar-lang-1.34-2.2.ppc64le","product_id":"tar-lang-1.34-2.2.ppc64le"}},{"category":"product_version","name":"tar-rmt-1.34-2.2.ppc64le","product":{"name":"tar-rmt-1.34-2.2.ppc64le","product_id":"tar-rmt-1.34-2.2.ppc64le"}},{"category":"product_version","name":"tar-tests-1.34-2.2.ppc64le","product":{"name":"tar-tests-1.34-2.2.ppc64le","product_id":"tar-tests-1.34-2.2.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"tar-1.34-2.2.s390x","product":{"name":"tar-1.34-2.2.s390x","product_id":"tar-1.34-2.2.s390x"}},{"category":"product_version","name":"tar-backup-scripts-1.34-2.2.s390x","product":{"name":"tar-backup-scripts-1.34-2.2.s390x","product_id":"tar-backup-scripts-1.34-2.2.s390x"}},{"category":"product_version","name":"tar-doc-1.34-2.2.s390x","product":{"name":"tar-doc-1.34-2.2.s390x","product_id":"tar-doc-1.34-2.2.s390x"}},{"category":"product_version","name":"tar-lang-1.34-2.2.s390x","product":{"name":"tar-lang-1.34-2.2.s390x","product_id":"tar-lang-1.34-2.2.s390x"}},{"category":"product_version","name":"tar-rmt-1.34-2.2.s390x","product":{"name":"tar-rmt-1.34-2.2.s390x","product_id":"tar-rmt-1.34-2.2.s390x"}},{"category":"product_version","name":"tar-tests-1.34-2.2.s390x","product":{"name":"tar-tests-1.34-2.2.s390x","product_id":"tar-tests-1.34-2.2.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"tar-1.34-2.2.x86_64","product":{"name":"tar-1.34-2.2.x86_64","product_id":"tar-1.34-2.2.x86_64"}},{"category":"product_version","name":"tar-backup-scripts-1.34-2.2.x86_64","product":{"name":"tar-backup-scripts-1.34-2.2.x86_64","product_id":"tar-backup-scripts-1.34-2.2.x86_64"}},{"category":"product_version","name":"tar-doc-1.34-2.2.x86_64","product":{"name":"tar-doc-1.34-2.2.x86_64","product_id":"tar-doc-1.34-2.2.x86_64"}},{"category":"product_version","name":"tar-lang-1.34-2.2.x86_64","product":{"name":"tar-lang-1.34-2.2.x86_64","product_id":"tar-lang-1.34-2.2.x86_64"}},{"category":"product_version","name":"tar-rmt-1.34-2.2.x86_64","product":{"name":"tar-rmt-1.34-2.2.x86_64","product_id":"tar-rmt-1.34-2.2.x86_64"}},{"category":"product_version","name":"tar-tests-1.34-2.2.x86_64","product":{"name":"tar-tests-1.34-2.2.x86_64","product_id":"tar-tests-1.34-2.2.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"tar-1.34-2.2.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-1.34-2.2.aarch64"},"product_reference":"tar-1.34-2.2.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-1.34-2.2.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-1.34-2.2.ppc64le"},"product_reference":"tar-1.34-2.2.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-1.34-2.2.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-1.34-2.2.s390x"},"product_reference":"tar-1.34-2.2.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-1.34-2.2.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-1.34-2.2.x86_64"},"product_reference":"tar-1.34-2.2.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-backup-scripts-1.34-2.2.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64"},"product_reference":"tar-backup-scripts-1.34-2.2.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-backup-scripts-1.34-2.2.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le"},"product_reference":"tar-backup-scripts-1.34-2.2.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-backup-scripts-1.34-2.2.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x"},"product_reference":"tar-backup-scripts-1.34-2.2.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-backup-scripts-1.34-2.2.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64"},"product_reference":"tar-backup-scripts-1.34-2.2.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-doc-1.34-2.2.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64"},"product_reference":"tar-doc-1.34-2.2.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-doc-1.34-2.2.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le"},"product_reference":"tar-doc-1.34-2.2.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-doc-1.34-2.2.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x"},"product_reference":"tar-doc-1.34-2.2.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-doc-1.34-2.2.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64"},"product_reference":"tar-doc-1.34-2.2.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-lang-1.34-2.2.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64"},"product_reference":"tar-lang-1.34-2.2.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-lang-1.34-2.2.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le"},"product_reference":"tar-lang-1.34-2.2.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-lang-1.34-2.2.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x"},"product_reference":"tar-lang-1.34-2.2.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-lang-1.34-2.2.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64"},"product_reference":"tar-lang-1.34-2.2.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-rmt-1.34-2.2.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64"},"product_reference":"tar-rmt-1.34-2.2.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-rmt-1.34-2.2.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le"},"product_reference":"tar-rmt-1.34-2.2.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-rmt-1.34-2.2.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x"},"product_reference":"tar-rmt-1.34-2.2.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-rmt-1.34-2.2.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64"},"product_reference":"tar-rmt-1.34-2.2.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-tests-1.34-2.2.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64"},"product_reference":"tar-tests-1.34-2.2.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-tests-1.34-2.2.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le"},"product_reference":"tar-tests-1.34-2.2.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-tests-1.34-2.2.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x"},"product_reference":"tar-tests-1.34-2.2.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tar-tests-1.34-2.2.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"},"product_reference":"tar-tests-1.34-2.2.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2001-1267","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2001-1267"}],"notes":[{"category":"general","text":"Directory traversal vulnerability in GNU tar 1.13.19 and earlier allows local users to overwrite arbitrary files during archive extraction via a tar file whose filenames contain a .. (dot dot).","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2001-1267","url":"https://www.suse.com/security/cve/CVE-2001-1267"},{"category":"external","summary":"SUSE Bug 1203750 for CVE-2001-1267","url":"https://bugzilla.suse.com/1203750"},{"category":"external","summary":"SUSE Bug 299738 for CVE-2001-1267","url":"https://bugzilla.suse.com/299738"},{"category":"external","summary":"SUSE Bug 299745 for CVE-2001-1267","url":"https://bugzilla.suse.com/299745"},{"category":"external","summary":"SUSE Bug 299747 for CVE-2001-1267","url":"https://bugzilla.suse.com/299747"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2001-1267"},{"cve":"CVE-2002-0399","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2002-0399"}],"notes":[{"category":"general","text":"Directory traversal vulnerability in GNU tar 1.13.19 through 1.13.25, and possibly later versions, allows attackers to overwrite arbitrary files during archive extraction via a (1) \"/..\" or (2) \"./..\" string, which removes the leading slash but leaves the \"..\", a variant of CVE-2001-1267.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2002-0399","url":"https://www.suse.com/security/cve/CVE-2002-0399"},{"category":"external","summary":"SUSE Bug 145081 for CVE-2002-0399","url":"https://bugzilla.suse.com/145081"},{"category":"external","summary":"SUSE Bug 299738 for CVE-2002-0399","url":"https://bugzilla.suse.com/299738"},{"category":"external","summary":"SUSE Bug 299745 for CVE-2002-0399","url":"https://bugzilla.suse.com/299745"},{"category":"external","summary":"SUSE Bug 299747 for CVE-2002-0399","url":"https://bugzilla.suse.com/299747"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2002-0399"},{"cve":"CVE-2005-1918","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2005-1918"}],"notes":[{"category":"general","text":"The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an \"incorrect optimization\" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving \"/../\" sequences with a leading \"/\".","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2005-1918","url":"https://www.suse.com/security/cve/CVE-2005-1918"},{"category":"external","summary":"SUSE Bug 145081 for CVE-2005-1918","url":"https://bugzilla.suse.com/145081"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2005-1918"},{"cve":"CVE-2006-0300","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2006-0300"}],"notes":[{"category":"general","text":"Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2006-0300","url":"https://www.suse.com/security/cve/CVE-2006-0300"},{"category":"external","summary":"SUSE Bug 151516 for CVE-2006-0300","url":"https://bugzilla.suse.com/151516"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"moderate"}],"title":"CVE-2006-0300"},{"cve":"CVE-2006-6097","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2006-6097"}],"notes":[{"category":"general","text":"GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2006-6097","url":"https://www.suse.com/security/cve/CVE-2006-6097"},{"category":"external","summary":"SUSE Bug 223185 for CVE-2006-6097","url":"https://bugzilla.suse.com/223185"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2006-6097"},{"cve":"CVE-2018-20482","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2018-20482"}],"notes":[{"category":"general","text":"GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process (e.g., a system backup running as root).","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2018-20482","url":"https://www.suse.com/security/cve/CVE-2018-20482"},{"category":"external","summary":"SUSE Bug 1120610 for CVE-2018-20482","url":"https://bugzilla.suse.com/1120610"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","version":"3.0"},"products":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2018-20482"},{"cve":"CVE-2019-9923","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-9923"}],"notes":[{"category":"general","text":"pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2019-9923","url":"https://www.suse.com/security/cve/CVE-2019-9923"},{"category":"external","summary":"SUSE Bug 1130496 for CVE-2019-9923","url":"https://bugzilla.suse.com/1130496"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","version":"3.0"},"products":["openSUSE Tumbleweed:tar-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-1.34-2.2.s390x","openSUSE Tumbleweed:tar-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.s390x","openSUSE Tumbleweed:tar-backup-scripts-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-doc-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-doc-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-doc-1.34-2.2.s390x","openSUSE Tumbleweed:tar-doc-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-lang-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-lang-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-lang-1.34-2.2.s390x","openSUSE Tumbleweed:tar-lang-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-rmt-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-rmt-1.34-2.2.s390x","openSUSE Tumbleweed:tar-rmt-1.34-2.2.x86_64","openSUSE Tumbleweed:tar-tests-1.34-2.2.aarch64","openSUSE Tumbleweed:tar-tests-1.34-2.2.ppc64le","openSUSE Tumbleweed:tar-tests-1.34-2.2.s390x","openSUSE Tumbleweed:tar-tests-1.34-2.2.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-15T00:00:00Z","details":"low"}],"title":"CVE-2019-9923"}]}