Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2023:0959

Опубликовано: 06 апр. 2023
Источник: rocky
Оценка: Moderate

Описание

Moderate: tar security update

The GNU tar program can save multiple files in an archive and restore files from an archive.

Security Fix(es):

  • tar: heap buffer overflow at from_header() in list.c via specially crafted checksum (CVE-2022-48303)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
tarx86_646.el9_1tar-1.34-6.el9_1.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 2 лет назад

GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.

CVSS3: 5.5
redhat
больше 3 лет назад

GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.

CVSS3: 5.5
nvd
больше 2 лет назад

GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.

CVSS3: 5.5
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 5.5
debian
больше 2 лет назад

GNU Tar through 1.34 has a one-byte out-of-bounds read that results in ...