First published: Wed Nov 30 2022(Updated: )
A Heap Buffer Overflow issue takes place at from_header() in list.c in the tar application. The issue occurs when attempting to read files with old V7 tar format with an especially crafted checksum. As a result, an invalid memory read that leads to a conditional jump or move operation on uninitialised memory values takes place. Reference: <a href="https://savannah.gnu.org/bugs/?62387">https://savannah.gnu.org/bugs/?62387</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu tar |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2149722 is high due to the potential for a heap buffer overflow that can lead to security vulnerabilities.
To fix REDHAT-BUG-2149722, users should upgrade to the latest version of GNU tar where the vulnerability has been patched.
The vulnerability in REDHAT-BUG-2149722 is caused by a heap buffer overflow that occurs in the from_header() function when processing specifically crafted files in old V7 tar format.
The software affected by REDHAT-BUG-2149722 is GNU tar.
REDHAT-BUG-2149722 is classified as a heap buffer overflow vulnerability.