This bug was fixed in the tagged releases
https://ubuntu.com/security/notices/USN-5329-1

General changelog:
  * SECURITY UPDATE: Denial of service (LP: #1912091)
    - debian/patches/CVE-2021-20193.patch: in read_header method in
      src/list.c, change the return value to be the value of status
      and break the execution, jumping to free next_long_name and
      next_long_link before returning.
    - CVE-2021-20193

** Also affects: tar (Ubuntu Bionic)
   Importance: Undecided
       Status: New

** Also affects: tar (Ubuntu Trusty)
   Importance: Undecided
       Status: New

** Also affects: tar (Ubuntu Focal)
   Importance: Undecided
       Status: New

** Also affects: tar (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Changed in: tar (Ubuntu Trusty)
       Status: New => Fix Released

** Changed in: tar (Ubuntu Xenial)
       Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912091

Title:
  Memory Leak GNU Tar 1.33

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1912091/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to