c68d67bfad
Fix CVE-2022-48303: GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters. With the bump to 1.35, the build will fail on systems that are not Y2038, such as some uClibc configurations. In order to preserve the previous behavior, pass --disable-year2038. See the gnulib documentation for details [1]. Contrary to what the option name might suggest, it doesn't really disable Y2038 support, but only the check that the system is Y2038 compliant. So even with --disable-year2038, if the system is Y2038 compliant (uses a 64-bit arch, uses the musl C library, or uses the glibc C library with BR2_TIME_BITS_64=y), tar will be Y2038 compliant. Update hash of COPYING (http replaced by https) [0] https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00005.html [1] https://www.gnu.org/software/gnulib/manual/html_node/Avoiding-the-year-2038-problem.html For the version bump: Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit |
||
---|---|---|
.. | ||
0001-lib-getrandom.c-fix-build-with-uclibc-1.0.35.patch | ||
Config.in | ||
tar.hash | ||
tar.mk |