oss-sec mailing list archives
Re: GNU tar: listing/extraction desynchronization allows hidden file injection
From: Collin Funk <collin.funk1 () gmail com>
Date: Sat, 11 Apr 2026 11:41:03 -0700
Alan Coopersmith <alan.coopersmith () oracle com> writes:
Red Hat appears to have assigned CVE-2026-5704 to this issue. Paul Eggert provided a patch in https://lists.gnu.org/archive/html/bug-tar/2026-03/msg00011.html which is also available in https://cgit.git.savannah.gnu.org/cgit/tar.git/commit/?id=b8d8a61b25588caca4efaf9bdd2e3f1a49da77e3 https://lists.gnu.org/archive/html/bug-tar/2026-03/msg00012.html points out that a similar report was also included in https://lists.gnu.org/archive/html/bug-tar/2026-02/msg00022.html along with a number of other bug reports.
Not directly related to the issues in GNU tar, but one of the reports you shared [1]. See the following text:
I am happy to coordinate on a disclosure timeline. Please let me know if you need additional information or testing.
This is one of many examples I have seen lately of people writing as if they were sending private messages on a public list. I assume it is a common LLM hallucination? I find it mildly annoying, especially since it is often paired with total slop. I guess in this case it isn't a bug deal since it is associated with an actual issue. For a worse example, see a recent bug report in GNU coreutils claiming that the 'printf' command allowed for remote code execution because it allows the user the control the format string [2]. Which is made worse by it just making up code that doesn't exist. Collin [1] https://lists.gnu.org/archive/html/bug-tar/2026-03/msg00007.html [2] https://bugs.gnu.org/80802
Current thread:
- GNU tar: listing/extraction desynchronization allows hidden file injection Alan Coopersmith (Apr 11)
- Re: GNU tar: listing/extraction desynchronization allows hidden file injection Collin Funk (Apr 11)
