A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tar | Gnu | * | 1.33 (including) |
Tar | Ubuntu | bionic | * |
Tar | Ubuntu | devel | * |
Tar | Ubuntu | esm-infra/xenial | * |
Tar | Ubuntu | focal | * |
Tar | Ubuntu | groovy | * |
Tar | Ubuntu | hirsute | * |
Tar | Ubuntu | impish | * |
Tar | Ubuntu | jammy | * |
Tar | Ubuntu | kinetic | * |
Tar | Ubuntu | lunar | * |
Tar | Ubuntu | precise/esm | * |
Tar | Ubuntu | trusty | * |
Tar | Ubuntu | trusty/esm | * |
Tar | Ubuntu | upstream | * |
Tar | Ubuntu | xenial | * |