ALT-PU-2021-1651-1
Closed vulnerabilities
BDU:2021-02357
Уязвимость реализации функции read_header() архиватора GNU Tar, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-00577
Уязвимость функции from_header (list.c) архиватора GNU Tar, связанная с чтением за пределами памяти, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2021-20193
A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1917565
- https://bugzilla.redhat.com/show_bug.cgi?id=1917565
- https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
- https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
- https://savannah.gnu.org/bugs/?59897
- https://savannah.gnu.org/bugs/?59897
- GLSA-202105-29
- GLSA-202105-29
Modified: 2025-03-28
CVE-2022-48303
GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.