Mageia 2023-0079: tar security update
Summary
GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use
of uninitialized memory for a conditional jump. Exploitation to change the
flow of control has not been demonstrated. The issue occurs in from_header
in list.c via a V7 archive in which mtime has approximately 11 whitespace
characters. (CVE-2022-48303)
References
- https://bugs.mageia.org/show_bug.cgi?id=31569
- https://lists.suse.com/pipermail/sle-security-updates/2023-February/013834.html
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EMCL5SDDZC2JTGVOT5D2T56IWCRICHJD/
- https://access.redhat.com/errata/RHSA-2023:0842
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48303
Resolution
MGASA-2023-0079 - Updated tar packages fix security vulnerability
SRPMS
- 8/core/tar-1.33-2.2.mga8