发布时间: 2023年2月17日
修改时间: 2024年10月31日
GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.
NVD | openEuler | |
---|---|---|
Confidentiality | None | High |
Attack Vector | Local | Local |
CVSS评分 | 5.5 | 7.8 |
Attack Complexity | Low | Low |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | None | High |
User Interaction | Required | Required |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1114 | tar security update | 2023年2月17日 |
KylinSec-SA-2023-1115 | tar security update | 2023年2月17日 |
KylinSec-SA-2023-1154 | tar security update | 2023年2月17日 |
KylinSec-SA-2023-2088 | tar security update | 2023年2月21日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | tar | Fixed |
KY3.4-5A | tar | Fixed |
KY3.5.1 | tar | Fixed |
KY3.5.2 | tar | Fixed |