Release date:
2023-03-02 19:10:49 UTC
Description:
* SECURITY UPDATE: memory leak in read_header
- debian/patches/CVE-2021-20193.patch: Don't return directly
from the loop. Instead set the status and break. Return the
status.
- CVE-2021-20193.patch
* SECURITY UPDATE: a heap buffer overflow
- debian/patches/CVE-2022-48303.patch: Check for the end of
field after leading byte (0x80 or 0xff) of base-256 encoded
header value.
- CVE-2022-48303.patch
* improve debian/rules to build the project by root
Updated packages:
-
tar_1.28-2.1ubuntu0.2+tuxcare.els1_amd64.deb
sha:81a1ad7a69d85bcc49ac67ab9f506592bd86c8c1
-
tar-scripts_1.28-2.1ubuntu0.2+tuxcare.els1_amd64.deb
sha:7d04a9f7349527cf92b35b433076117e9fe113ff
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.