Bug 1917565 (CVE-2021-20193)
| Summary: | CVE-2021-20193 tar: Memory leak in read_header() in list.c | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> | ||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
| Status: | CLOSED WONTFIX | QA Contact: | |||||
| Severity: | medium | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | unspecified | CC: | ahrabovs, andres, aprice, aucunnin, caswilli, databases-maint, dfreiber, dhalasz, drow, jburrell, jsamir, jvasik, kaycoth, kdudka, mpierce, mstoklus, oezr, orabin, ovasik, panovotn, pkubat, praiskup, rblanco, sthirugn, tmeszaro, vkrizan, vkumar, vmugicag | ||||
| Target Milestone: | --- | Keywords: | Security | ||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |||||
| Doc Text: |
A flaw was found in the src/list.c of tar. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.
|
Story Points: | --- | ||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2021-11-02 18:25:16 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | 1917631, 1917633, 1917634, 1917742 | ||||||
| Bug Blocks: | 1917567, 1939998 | ||||||
| Attachments: |
|
||||||
|
Description
Pedro Sampaio
2021-01-18 18:35:40 UTC
Created attachment 1748610 [details]
PoC - Test case for memory leak/crash
This is the .tar test case from my original report. Can be used with Valgrind to confirm the memory leak before the crash.
Flaw summary: Memory pointed to by `next_long_name` and `next_long_link` was not being freed upon return of the `read_header()` routine in src/list.c. An attacker who provided a specially crafted input file to tar could cause an impact to application availability. The patch changes `read_header()` to not return before freeing memory pointed to by `next_long_name` and `next_long_link`. Created tar tracking bugs for this issue: Affects: fedora-all [bug 1917631] |