libtar: Arbitraty code execution
Gentoo Linux Security Advisory
||GLSA 201402-19 / libtar
||February 21, 2014
||February 21, 2014: 1
All supported architectures
A buffer overflow in libtar might allow remote attackers to execute
arbitrary code or cause a Denial of Service condition.
libtar is a C library for manipulating POSIX tar files.
An integer overflow error within the “th_read()” function when
processing long names or link extensions can be exploited to cause a
heap-based buffer overflow via a specially crafted archive.
A remote attacker could entice a user to open a specially crafted file
using a program linked against libtar, possibly resulting in execution of
arbitrary code with the privileges of the process or a Denial of Service
There is no known workaround at this time.
All libtar users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/libtar-1.2.20-r2"