#4813: tar-1.34
--------------------+-----------------------
 Reporter:  bdubbs  |       Owner:  lfs-book
     Type:  task    |      Status:  closed
 Priority:  high    |   Milestone:  10.1
Component:  Book    |     Version:  SVN
 Severity:  normal  |  Resolution:  fixed
 Keywords:          |
--------------------+-----------------------
Changes (by renodr):

 * priority:  normal => high


Comment:

 Retroactively promote due to CVE-2021-20193

 {{{


 Arch Linux Security Advisory ASA-202102-41
 ==========================================

 Severity: Low
 Date    : 2021-02-27
 CVE-ID  : CVE-2021-20193
 Package : tar
 Type    : denial of service
 Remote  : No
 Link    : https://security.archlinux.org/AVG-1462

 Summary
 =======

 The package tar before version 1.34-1 is vulnerable to denial of
 service.

 Resolution
 ==========

 Upgrade to 1.34-1.

 # pacman -Syu "tar>=1.34-1"

 The problem has been fixed upstream in version 1.34.

 Workaround
 ==========

 None.

 Description
 ===========

 An issue was discovered in GNU Tar before version 1.34. There is a
 memory leak in read_header() in list.c in the tar application.

 Impact
 ======

 A crafted tar archive can crash the application.

 References
 ==========

 https://bugzilla.redhat.com/show_bug.cgi?id=1917565
 https://savannah.gnu.org/bugs/?59897
 
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
 https://security.archlinux.org/CVE-2021-20193
 }}}

--
Ticket URL: <http://wiki.linuxfromscratch.org/lfs/ticket/4813#comment:3>
LFS Trac <http://wiki.linuxfromscratch.org/lfs/>
Linux From Scratch: Your Distro, Your Rules.
-- 
http://lists.linuxfromscratch.org/listinfo/lfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to