First published: Mon Jan 18 2021(Updated: )
An issue was discovered in GNU Tar 1.33 and earlier. There is a memory leak in read_header() in list.c in the tar application. Upstream bug: <a href="https://savannah.gnu.org/bugs/?59897">https://savannah.gnu.org/bugs/?59897</a> Upstream patch: <a href="https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777">https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu tar | <1.33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1917565 is classified as a memory leak in GNU Tar versions 1.33 and earlier.
To fix REDHAT-BUG-1917565, update GNU Tar to a version later than 1.33 that includes the patch for this issue.
GNU Tar versions 1.33 and earlier are affected by REDHAT-BUG-1917565.
The component involved in REDHAT-BUG-1917565 is the read_header() function in list.c.
Yes, there is an upstream patch available to address REDHAT-BUG-1917565.