Description
A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.
References
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
Issue TrackingPatchThird Party Advisory
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
Mailing ListPatchThird Party Advisory
https://savannah.gnu.org/bugs/?59897
Issue TrackingPatchVendor Advisory
https://security.gentoo.org/glsa/202105-29
Third Party Advisory
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
5.5 · Medium
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Modified
Published
2021-03-26T17:15:12.843
4 years agoLast modified
2023-11-07T03:28:59.727
1 year ago